Analysis
-
max time kernel
60s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 11:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb5909c4417392021e82faf58fc47516.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
cb5909c4417392021e82faf58fc47516.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
cb5909c4417392021e82faf58fc47516.exe
-
Size
187KB
-
MD5
cb5909c4417392021e82faf58fc47516
-
SHA1
a10774c22afdb0771e06086cb8816b3510a5bdbb
-
SHA256
8e3f3cc223ecba3b680992f9b157d5ce7e6ad43ae5a75205dd48b93d894892bd
-
SHA512
4fe7266045bc8189e6f18987e2cfc6f93e31a84614e95245c44f87a0529441408ce02121829483feaf8d7533373d25219c1f908efa283b20882b821f8621a434
-
SSDEEP
3072:UYgd9Ow/jaqg5MjKUG7sPYIVvdslOIvo95TuR8LY/tkoT9gTrZl948V1lukVQ:t+1gqysPv0nvo9tuR8bi9gTlvAR
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2692 set thread context of 3016 2692 cb5909c4417392021e82faf58fc47516.exe 29 PID 3016 set thread context of 2560 3016 cb5909c4417392021e82faf58fc47516.exe 31 PID 2560 set thread context of 2440 2560 cb5909c4417392021e82faf58fc47516.exe 33 PID 2440 set thread context of 2400 2440 cb5909c4417392021e82faf58fc47516.exe 109 PID 2400 set thread context of 2876 2400 cb5909c4417392021e82faf58fc47516.exe 37 PID 2876 set thread context of 584 2876 cb5909c4417392021e82faf58fc47516.exe 39 PID 584 set thread context of 1180 584 cb5909c4417392021e82faf58fc47516.exe 41 PID 1180 set thread context of 1500 1180 cb5909c4417392021e82faf58fc47516.exe 43 PID 1500 set thread context of 1724 1500 cb5909c4417392021e82faf58fc47516.exe 45 PID 1724 set thread context of 1820 1724 cb5909c4417392021e82faf58fc47516.exe 47 PID 1820 set thread context of 1268 1820 cb5909c4417392021e82faf58fc47516.exe 49 PID 1268 set thread context of 768 1268 cb5909c4417392021e82faf58fc47516.exe 51 PID 768 set thread context of 2784 768 cb5909c4417392021e82faf58fc47516.exe 92 PID 2784 set thread context of 2776 2784 cb5909c4417392021e82faf58fc47516.exe 55 PID 2776 set thread context of 1916 2776 cb5909c4417392021e82faf58fc47516.exe 57 PID 1916 set thread context of 1788 1916 cb5909c4417392021e82faf58fc47516.exe 96 PID 1788 set thread context of 2032 1788 cb5909c4417392021e82faf58fc47516.exe 98 PID 2032 set thread context of 1408 2032 cb5909c4417392021e82faf58fc47516.exe 63 PID 1408 set thread context of 1608 1408 cb5909c4417392021e82faf58fc47516.exe 65 PID 1608 set thread context of 1692 1608 cb5909c4417392021e82faf58fc47516.exe 67 PID 1692 set thread context of 2548 1692 cb5909c4417392021e82faf58fc47516.exe 69 PID 2548 set thread context of 2568 2548 cb5909c4417392021e82faf58fc47516.exe 142 PID 2568 set thread context of 2468 2568 cb5909c4417392021e82faf58fc47516.exe 73 PID 2468 set thread context of 784 2468 cb5909c4417392021e82faf58fc47516.exe 113 PID 784 set thread context of 2724 784 cb5909c4417392021e82faf58fc47516.exe 77 PID 2724 set thread context of 1412 2724 cb5909c4417392021e82faf58fc47516.exe 79 PID 1412 set thread context of 2264 1412 cb5909c4417392021e82faf58fc47516.exe 81 PID 2264 set thread context of 1956 2264 cb5909c4417392021e82faf58fc47516.exe 83 PID 1956 set thread context of 1748 1956 cb5909c4417392021e82faf58fc47516.exe 85 PID 1748 set thread context of 1100 1748 cb5909c4417392021e82faf58fc47516.exe 87 PID 1100 set thread context of 1512 1100 cb5909c4417392021e82faf58fc47516.exe 89 PID 1512 set thread context of 1300 1512 cb5909c4417392021e82faf58fc47516.exe 91 PID 1300 set thread context of 2044 1300 cb5909c4417392021e82faf58fc47516.exe 93 PID 2044 set thread context of 300 2044 cb5909c4417392021e82faf58fc47516.exe 95 PID 300 set thread context of 2080 300 cb5909c4417392021e82faf58fc47516.exe 163 PID 2080 set thread context of 704 2080 cb5909c4417392021e82faf58fc47516.exe 193 PID 704 set thread context of 1552 704 cb5909c4417392021e82faf58fc47516.exe 101 PID 1552 set thread context of 2604 1552 cb5909c4417392021e82faf58fc47516.exe 103 PID 2604 set thread context of 2536 2604 cb5909c4417392021e82faf58fc47516.exe 141 PID 2536 set thread context of 2456 2536 cb5909c4417392021e82faf58fc47516.exe 107 PID 2456 set thread context of 2400 2456 cb5909c4417392021e82faf58fc47516.exe 109 PID 2400 set thread context of 1504 2400 cb5909c4417392021e82faf58fc47516.exe 195 PID 1504 set thread context of 784 1504 cb5909c4417392021e82faf58fc47516.exe 113 PID 784 set thread context of 2168 784 cb5909c4417392021e82faf58fc47516.exe 150 PID 2168 set thread context of 1112 2168 cb5909c4417392021e82faf58fc47516.exe 203 PID 1112 set thread context of 1688 1112 cb5909c4417392021e82faf58fc47516.exe 119 PID 1688 set thread context of 1088 1688 cb5909c4417392021e82faf58fc47516.exe 121 PID 1088 set thread context of 1792 1088 cb5909c4417392021e82faf58fc47516.exe 270 PID 1792 set thread context of 2640 1792 cb5909c4417392021e82faf58fc47516.exe 160 PID 2640 set thread context of 2832 2640 cb5909c4417392021e82faf58fc47516.exe 127 PID 2832 set thread context of 2180 2832 cb5909c4417392021e82faf58fc47516.exe 129 PID 2180 set thread context of 888 2180 cb5909c4417392021e82faf58fc47516.exe 131 PID 888 set thread context of 2868 888 cb5909c4417392021e82faf58fc47516.exe 133 PID 2868 set thread context of 1604 2868 cb5909c4417392021e82faf58fc47516.exe 135 PID 1604 set thread context of 2428 1604 cb5909c4417392021e82faf58fc47516.exe 138 PID 2428 set thread context of 1204 2428 cb5909c4417392021e82faf58fc47516.exe 172 PID 1204 set thread context of 2568 1204 cb5909c4417392021e82faf58fc47516.exe 142 PID 2568 set thread context of 572 2568 cb5909c4417392021e82faf58fc47516.exe 144 PID 572 set thread context of 2664 572 cb5909c4417392021e82faf58fc47516.exe 177 PID 2664 set thread context of 1084 2664 cb5909c4417392021e82faf58fc47516.exe 149 PID 1084 set thread context of 1400 1084 cb5909c4417392021e82faf58fc47516.exe 151 PID 1400 set thread context of 1580 1400 cb5909c4417392021e82faf58fc47516.exe 153 PID 1580 set thread context of 1728 1580 cb5909c4417392021e82faf58fc47516.exe 155 PID 1728 set thread context of 548 1728 cb5909c4417392021e82faf58fc47516.exe 244 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2692 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 3016 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2560 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2440 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2400 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2876 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 584 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1180 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1500 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1724 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1820 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1268 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 768 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2784 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2776 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1916 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1788 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2032 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1408 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1608 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1692 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2548 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2568 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2468 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 784 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2724 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1412 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2264 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1956 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1748 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1100 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1512 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1300 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2044 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 300 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2080 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 704 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1552 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2604 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2536 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2456 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2400 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1504 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 784 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2168 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1112 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1688 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1088 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1792 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2640 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2832 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2180 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 888 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2868 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1604 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2428 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1204 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2568 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 572 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 2664 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1084 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1400 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1580 cb5909c4417392021e82faf58fc47516.exe Token: SeDebugPrivilege 1728 cb5909c4417392021e82faf58fc47516.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2496 2692 cb5909c4417392021e82faf58fc47516.exe 28 PID 2692 wrote to memory of 2496 2692 cb5909c4417392021e82faf58fc47516.exe 28 PID 2692 wrote to memory of 2496 2692 cb5909c4417392021e82faf58fc47516.exe 28 PID 2692 wrote to memory of 3016 2692 cb5909c4417392021e82faf58fc47516.exe 29 PID 2692 wrote to memory of 3016 2692 cb5909c4417392021e82faf58fc47516.exe 29 PID 2692 wrote to memory of 3016 2692 cb5909c4417392021e82faf58fc47516.exe 29 PID 2692 wrote to memory of 3016 2692 cb5909c4417392021e82faf58fc47516.exe 29 PID 2692 wrote to memory of 3016 2692 cb5909c4417392021e82faf58fc47516.exe 29 PID 3016 wrote to memory of 2684 3016 cb5909c4417392021e82faf58fc47516.exe 30 PID 3016 wrote to memory of 2684 3016 cb5909c4417392021e82faf58fc47516.exe 30 PID 3016 wrote to memory of 2684 3016 cb5909c4417392021e82faf58fc47516.exe 30 PID 3016 wrote to memory of 2560 3016 cb5909c4417392021e82faf58fc47516.exe 31 PID 3016 wrote to memory of 2560 3016 cb5909c4417392021e82faf58fc47516.exe 31 PID 3016 wrote to memory of 2560 3016 cb5909c4417392021e82faf58fc47516.exe 31 PID 3016 wrote to memory of 2560 3016 cb5909c4417392021e82faf58fc47516.exe 31 PID 3016 wrote to memory of 2560 3016 cb5909c4417392021e82faf58fc47516.exe 31 PID 2560 wrote to memory of 2688 2560 cb5909c4417392021e82faf58fc47516.exe 32 PID 2560 wrote to memory of 2688 2560 cb5909c4417392021e82faf58fc47516.exe 32 PID 2560 wrote to memory of 2688 2560 cb5909c4417392021e82faf58fc47516.exe 32 PID 2560 wrote to memory of 2440 2560 cb5909c4417392021e82faf58fc47516.exe 33 PID 2560 wrote to memory of 2440 2560 cb5909c4417392021e82faf58fc47516.exe 33 PID 2560 wrote to memory of 2440 2560 cb5909c4417392021e82faf58fc47516.exe 33 PID 2560 wrote to memory of 2440 2560 cb5909c4417392021e82faf58fc47516.exe 33 PID 2560 wrote to memory of 2440 2560 cb5909c4417392021e82faf58fc47516.exe 33 PID 2440 wrote to memory of 2404 2440 cb5909c4417392021e82faf58fc47516.exe 34 PID 2440 wrote to memory of 2404 2440 cb5909c4417392021e82faf58fc47516.exe 34 PID 2440 wrote to memory of 2404 2440 cb5909c4417392021e82faf58fc47516.exe 34 PID 2440 wrote to memory of 2400 2440 cb5909c4417392021e82faf58fc47516.exe 109 PID 2440 wrote to memory of 2400 2440 cb5909c4417392021e82faf58fc47516.exe 109 PID 2440 wrote to memory of 2400 2440 cb5909c4417392021e82faf58fc47516.exe 109 PID 2440 wrote to memory of 2400 2440 cb5909c4417392021e82faf58fc47516.exe 109 PID 2440 wrote to memory of 2400 2440 cb5909c4417392021e82faf58fc47516.exe 109 PID 2400 wrote to memory of 2976 2400 cb5909c4417392021e82faf58fc47516.exe 36 PID 2400 wrote to memory of 2976 2400 cb5909c4417392021e82faf58fc47516.exe 36 PID 2400 wrote to memory of 2976 2400 cb5909c4417392021e82faf58fc47516.exe 36 PID 2400 wrote to memory of 2876 2400 cb5909c4417392021e82faf58fc47516.exe 37 PID 2400 wrote to memory of 2876 2400 cb5909c4417392021e82faf58fc47516.exe 37 PID 2400 wrote to memory of 2876 2400 cb5909c4417392021e82faf58fc47516.exe 37 PID 2400 wrote to memory of 2876 2400 cb5909c4417392021e82faf58fc47516.exe 37 PID 2400 wrote to memory of 2876 2400 cb5909c4417392021e82faf58fc47516.exe 37 PID 2876 wrote to memory of 588 2876 cb5909c4417392021e82faf58fc47516.exe 38 PID 2876 wrote to memory of 588 2876 cb5909c4417392021e82faf58fc47516.exe 38 PID 2876 wrote to memory of 588 2876 cb5909c4417392021e82faf58fc47516.exe 38 PID 2876 wrote to memory of 584 2876 cb5909c4417392021e82faf58fc47516.exe 39 PID 2876 wrote to memory of 584 2876 cb5909c4417392021e82faf58fc47516.exe 39 PID 2876 wrote to memory of 584 2876 cb5909c4417392021e82faf58fc47516.exe 39 PID 2876 wrote to memory of 584 2876 cb5909c4417392021e82faf58fc47516.exe 39 PID 2876 wrote to memory of 584 2876 cb5909c4417392021e82faf58fc47516.exe 39 PID 584 wrote to memory of 1128 584 cb5909c4417392021e82faf58fc47516.exe 40 PID 584 wrote to memory of 1128 584 cb5909c4417392021e82faf58fc47516.exe 40 PID 584 wrote to memory of 1128 584 cb5909c4417392021e82faf58fc47516.exe 40 PID 584 wrote to memory of 1180 584 cb5909c4417392021e82faf58fc47516.exe 41 PID 584 wrote to memory of 1180 584 cb5909c4417392021e82faf58fc47516.exe 41 PID 584 wrote to memory of 1180 584 cb5909c4417392021e82faf58fc47516.exe 41 PID 584 wrote to memory of 1180 584 cb5909c4417392021e82faf58fc47516.exe 41 PID 584 wrote to memory of 1180 584 cb5909c4417392021e82faf58fc47516.exe 41 PID 1180 wrote to memory of 2956 1180 cb5909c4417392021e82faf58fc47516.exe 42 PID 1180 wrote to memory of 2956 1180 cb5909c4417392021e82faf58fc47516.exe 42 PID 1180 wrote to memory of 2956 1180 cb5909c4417392021e82faf58fc47516.exe 42 PID 1180 wrote to memory of 1500 1180 cb5909c4417392021e82faf58fc47516.exe 43 PID 1180 wrote to memory of 1500 1180 cb5909c4417392021e82faf58fc47516.exe 43 PID 1180 wrote to memory of 1500 1180 cb5909c4417392021e82faf58fc47516.exe 43 PID 1180 wrote to memory of 1500 1180 cb5909c4417392021e82faf58fc47516.exe 43 PID 1180 wrote to memory of 1500 1180 cb5909c4417392021e82faf58fc47516.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe"C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe2⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe3⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe4⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe5⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe6⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe7⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe8⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe9⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe9⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe10⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe10⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe11⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe11⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe12⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe12⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe13⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe13⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe14⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe14⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe15⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe15⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe16⤵PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe16⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe17⤵PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe17⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe18⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe18⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe19⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe19⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe20⤵PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe20⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe21⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe21⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe22⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe22⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe23⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe23⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe24⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe24⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe25⤵PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe25⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe26⤵PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe26⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe27⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe27⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe28⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe28⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe29⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe29⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe30⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe30⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe31⤵PID:308
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe31⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe32⤵PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe32⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe33⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe33⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe34⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe34⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe35⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe35⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:300 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe36⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe36⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe37⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe37⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe38⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe38⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe39⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe39⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe40⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe40⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe41⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe41⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe42⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe42⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe43⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe43⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe44⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe44⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:784 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe45⤵PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe45⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe46⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe46⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe47⤵PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe47⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe48⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe48⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe49⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe49⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe50⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe50⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe51⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe51⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe52⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe52⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe53⤵PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe53⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe54⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe54⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe55⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe55⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe56⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe56⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe57⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe57⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe58⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe58⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe59⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe59⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:572 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe60⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe60⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe61⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe61⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe62⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe62⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe63⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe63⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe64⤵PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe64⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe65⤵PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe65⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe66⤵PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe66⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe67⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe67⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe68⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe68⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe69⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe69⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe70⤵PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe70⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe71⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe71⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe72⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe72⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe73⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe73⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe74⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe74⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe75⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe75⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe76⤵PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe76⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe77⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe77⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe78⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe78⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe79⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe79⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe80⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe80⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe81⤵PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe81⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe82⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe82⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe83⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe83⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe84⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe84⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe85⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe85⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe86⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe86⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe87⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe87⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe88⤵PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe88⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe89⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe89⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe90⤵PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe90⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe91⤵PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe91⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe92⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe92⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe93⤵PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe93⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe94⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe94⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe95⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe95⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe96⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe96⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe97⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe97⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe98⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe98⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe99⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe99⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe100⤵PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe100⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe101⤵PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe101⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe102⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe102⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe103⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe103⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe104⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe104⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe105⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe105⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe106⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe106⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe107⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe107⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe108⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe108⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe109⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe109⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe110⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe110⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe111⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe111⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe112⤵PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe112⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe113⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe113⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe114⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe114⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe115⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe115⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe116⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe116⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe117⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe117⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe118⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe118⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe119⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe119⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe120⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe120⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe121⤵PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe121⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exeC:\Users\Admin\AppData\Local\Temp\cb5909c4417392021e82faf58fc47516.exe122⤵PID:1792
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-