Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 14:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6fabeaba1241d666562f01d87fedcebc.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6fabeaba1241d666562f01d87fedcebc.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
6fabeaba1241d666562f01d87fedcebc.exe
-
Size
116KB
-
MD5
6fabeaba1241d666562f01d87fedcebc
-
SHA1
7e0605ca0c8b0a34ae896346ff6a4a7f20c4d4a5
-
SHA256
56932afee9baee62b57b56214a2dc5e828aa57d4a78a9f1daa12e83915176e22
-
SHA512
11b5b834729e6a897a7029feccaf29474b8520b4a670be0458d8e13670856cf053598f4eac8b8605f55fa35c2dd72771b96788d0a0245e84ef9c2fc1e659f3b3
-
SSDEEP
1536:Wjr4136+AK8zHMJUEmnSHabTJawIXZpx4keoarsM35saT1Agn+QzusN2/C:20F6PKmMJ6nIabYwEQkXKbD5RPb
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2404 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3704 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3096 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3828 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3676 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4400 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4404 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1100 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2212 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 792 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1696 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 5024 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3520 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4688 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 640 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1660 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2548 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4028 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1840 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1984 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1620 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 8 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3460 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1048 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3928 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 5072 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2312 wmiprvse.exe Token: SeDebugPrivilege 4048 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4660 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4412 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4584 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2328 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2836 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4644 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4816 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3676 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2128 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1208 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4380 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 5048 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 544 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3256 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3852 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3748 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4812 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4716 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 5064 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2888 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2932 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4892 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2492 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1052 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3312 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2312 wmiprvse.exe Token: SeDebugPrivilege 4668 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2100 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3680 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1524 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1280 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1184 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4800 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 4816 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 3080 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 5104 6fabeaba1241d666562f01d87fedcebc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3704 2404 6fabeaba1241d666562f01d87fedcebc.exe 85 PID 2404 wrote to memory of 3704 2404 6fabeaba1241d666562f01d87fedcebc.exe 85 PID 3704 wrote to memory of 3096 3704 6fabeaba1241d666562f01d87fedcebc.exe 86 PID 3704 wrote to memory of 3096 3704 6fabeaba1241d666562f01d87fedcebc.exe 86 PID 3096 wrote to memory of 3828 3096 6fabeaba1241d666562f01d87fedcebc.exe 88 PID 3096 wrote to memory of 3828 3096 6fabeaba1241d666562f01d87fedcebc.exe 88 PID 3828 wrote to memory of 3676 3828 6fabeaba1241d666562f01d87fedcebc.exe 116 PID 3828 wrote to memory of 3676 3828 6fabeaba1241d666562f01d87fedcebc.exe 116 PID 3676 wrote to memory of 4400 3676 6fabeaba1241d666562f01d87fedcebc.exe 90 PID 3676 wrote to memory of 4400 3676 6fabeaba1241d666562f01d87fedcebc.exe 90 PID 4400 wrote to memory of 4404 4400 6fabeaba1241d666562f01d87fedcebc.exe 323 PID 4400 wrote to memory of 4404 4400 6fabeaba1241d666562f01d87fedcebc.exe 323 PID 4404 wrote to memory of 1100 4404 6fabeaba1241d666562f01d87fedcebc.exe 511 PID 4404 wrote to memory of 1100 4404 6fabeaba1241d666562f01d87fedcebc.exe 511 PID 1100 wrote to memory of 2212 1100 6fabeaba1241d666562f01d87fedcebc.exe 356 PID 1100 wrote to memory of 2212 1100 6fabeaba1241d666562f01d87fedcebc.exe 356 PID 2212 wrote to memory of 792 2212 6fabeaba1241d666562f01d87fedcebc.exe 675 PID 2212 wrote to memory of 792 2212 6fabeaba1241d666562f01d87fedcebc.exe 675 PID 792 wrote to memory of 1696 792 6fabeaba1241d666562f01d87fedcebc.exe 643 PID 792 wrote to memory of 1696 792 6fabeaba1241d666562f01d87fedcebc.exe 643 PID 1696 wrote to memory of 5024 1696 6fabeaba1241d666562f01d87fedcebc.exe 94 PID 1696 wrote to memory of 5024 1696 6fabeaba1241d666562f01d87fedcebc.exe 94 PID 5024 wrote to memory of 3520 5024 6fabeaba1241d666562f01d87fedcebc.exe 362 PID 5024 wrote to memory of 3520 5024 6fabeaba1241d666562f01d87fedcebc.exe 362 PID 3520 wrote to memory of 4688 3520 6fabeaba1241d666562f01d87fedcebc.exe 96 PID 3520 wrote to memory of 4688 3520 6fabeaba1241d666562f01d87fedcebc.exe 96 PID 4688 wrote to memory of 640 4688 6fabeaba1241d666562f01d87fedcebc.exe 333 PID 4688 wrote to memory of 640 4688 6fabeaba1241d666562f01d87fedcebc.exe 333 PID 640 wrote to memory of 1660 640 6fabeaba1241d666562f01d87fedcebc.exe 684 PID 640 wrote to memory of 1660 640 6fabeaba1241d666562f01d87fedcebc.exe 684 PID 1660 wrote to memory of 2548 1660 6fabeaba1241d666562f01d87fedcebc.exe 335 PID 1660 wrote to memory of 2548 1660 6fabeaba1241d666562f01d87fedcebc.exe 335 PID 2548 wrote to memory of 4028 2548 6fabeaba1241d666562f01d87fedcebc.exe 330 PID 2548 wrote to memory of 4028 2548 6fabeaba1241d666562f01d87fedcebc.exe 330 PID 4028 wrote to memory of 1840 4028 6fabeaba1241d666562f01d87fedcebc.exe 400 PID 4028 wrote to memory of 1840 4028 6fabeaba1241d666562f01d87fedcebc.exe 400 PID 1840 wrote to memory of 1984 1840 6fabeaba1241d666562f01d87fedcebc.exe 594 PID 1840 wrote to memory of 1984 1840 6fabeaba1241d666562f01d87fedcebc.exe 594 PID 1984 wrote to memory of 1620 1984 6fabeaba1241d666562f01d87fedcebc.exe 693 PID 1984 wrote to memory of 1620 1984 6fabeaba1241d666562f01d87fedcebc.exe 693 PID 1620 wrote to memory of 8 1620 6fabeaba1241d666562f01d87fedcebc.exe 589 PID 1620 wrote to memory of 8 1620 6fabeaba1241d666562f01d87fedcebc.exe 589 PID 8 wrote to memory of 3460 8 6fabeaba1241d666562f01d87fedcebc.exe 102 PID 8 wrote to memory of 3460 8 6fabeaba1241d666562f01d87fedcebc.exe 102 PID 3460 wrote to memory of 1048 3460 6fabeaba1241d666562f01d87fedcebc.exe 104 PID 3460 wrote to memory of 1048 3460 6fabeaba1241d666562f01d87fedcebc.exe 104 PID 1048 wrote to memory of 3928 1048 6fabeaba1241d666562f01d87fedcebc.exe 105 PID 1048 wrote to memory of 3928 1048 6fabeaba1241d666562f01d87fedcebc.exe 105 PID 3928 wrote to memory of 5072 3928 6fabeaba1241d666562f01d87fedcebc.exe 441 PID 3928 wrote to memory of 5072 3928 6fabeaba1241d666562f01d87fedcebc.exe 441 PID 5072 wrote to memory of 2312 5072 6fabeaba1241d666562f01d87fedcebc.exe 383 PID 5072 wrote to memory of 2312 5072 6fabeaba1241d666562f01d87fedcebc.exe 383 PID 2312 wrote to memory of 4048 2312 wmiprvse.exe 107 PID 2312 wrote to memory of 4048 2312 wmiprvse.exe 107 PID 4048 wrote to memory of 4660 4048 6fabeaba1241d666562f01d87fedcebc.exe 473 PID 4048 wrote to memory of 4660 4048 6fabeaba1241d666562f01d87fedcebc.exe 473 PID 4660 wrote to memory of 4412 4660 6fabeaba1241d666562f01d87fedcebc.exe 490 PID 4660 wrote to memory of 4412 4660 6fabeaba1241d666562f01d87fedcebc.exe 490 PID 4412 wrote to memory of 4584 4412 6fabeaba1241d666562f01d87fedcebc.exe 666 PID 4412 wrote to memory of 4584 4412 6fabeaba1241d666562f01d87fedcebc.exe 666 PID 4584 wrote to memory of 2328 4584 6fabeaba1241d666562f01d87fedcebc.exe 152 PID 4584 wrote to memory of 2328 4584 6fabeaba1241d666562f01d87fedcebc.exe 152 PID 2328 wrote to memory of 2836 2328 6fabeaba1241d666562f01d87fedcebc.exe 642 PID 2328 wrote to memory of 2836 2328 6fabeaba1241d666562f01d87fedcebc.exe 642
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe"C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:2360
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:3356
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4056
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:5072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:1900
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:2932
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:544 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1268
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:5092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:5104
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:768
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3036
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:1392
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:5080
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1392
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:1500
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:4068
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:2940
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵PID:4520
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1380
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1392
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe17⤵PID:2460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:2008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:3396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:3520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:4536
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4608
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:4540
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:396
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:244
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe17⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe18⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe19⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe20⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe21⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe22⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe23⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe24⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe25⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe26⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe27⤵PID:4732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:3124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:2336
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe17⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe19⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe20⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe21⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe22⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe23⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe24⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe25⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe26⤵
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe27⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe28⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe29⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe30⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe31⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe32⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe33⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe34⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe35⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe36⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe37⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe38⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe39⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe40⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe42⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe43⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe44⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe45⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe46⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe47⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe48⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe49⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe50⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe51⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe52⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe53⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe54⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe55⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe56⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe57⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe58⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe59⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe60⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe61⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe62⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe63⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe64⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe65⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe66⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe67⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe68⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe69⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe70⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe71⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe72⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe73⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe74⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe75⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe76⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe77⤵
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe78⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe79⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe80⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe81⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe82⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe83⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe84⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe85⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe86⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe87⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe88⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe89⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe90⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe91⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe92⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe93⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe94⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe95⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe96⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe97⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe98⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe99⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe100⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe101⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe102⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe103⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe104⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe105⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe106⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe107⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe108⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe109⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe110⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe111⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe112⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe113⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe114⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe115⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe116⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe117⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe118⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe119⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe120⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe121⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe122⤵PID:4484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-