Analysis
-
max time kernel
150s -
max time network
64s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-05-2021 12:56
Static task
static1
Behavioral task
behavioral1
Sample
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe
Resource
win10v20210408
General
-
Target
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe
-
Size
747KB
-
MD5
cdf338251e81a7e534d4ad847a0cc01f
-
SHA1
6e420d5f4c0dde21b1ad80f58db7d05855dfa21d
-
SHA256
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4
-
SHA512
b2123eae4d19edc94eb930e5063c123ff374bf9f968bbefb96f96fcb4410b107544d5c97c5d85eb7ec4a05d262e97b18e2b578f620967c166cd91675d87819a1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
PYEwIwsI.exeBOMYscYQ.exepid process 2004 PYEwIwsI.exe 2028 BOMYscYQ.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
BOMYscYQ.exedescription ioc process File created C:\Users\Admin\Pictures\ExitEnter.png.exe BOMYscYQ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BOMYscYQ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Control Panel\International\Geo\Nation BOMYscYQ.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1152 cmd.exe -
Loads dropped DLL 14 IoCs
Processes:
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeBOMYscYQ.exepid process 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeBOMYscYQ.exePYEwIwsI.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\PYEwIwsI.exe = "C:\\Users\\Admin\\ewIsgswM\\PYEwIwsI.exe" 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BOMYscYQ.exe = "C:\\ProgramData\\CcYwkkIc\\BOMYscYQ.exe" 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BOMYscYQ.exe = "C:\\ProgramData\\CcYwkkIc\\BOMYscYQ.exe" BOMYscYQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\PYEwIwsI.exe = "C:\\Users\\Admin\\ewIsgswM\\PYEwIwsI.exe" PYEwIwsI.exe -
Drops file in Windows directory 1 IoCs
Processes:
BOMYscYQ.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico BOMYscYQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 652 reg.exe 844 reg.exe 916 reg.exe 628 reg.exe 332 reg.exe 1300 reg.exe 612 reg.exe 540 reg.exe 944 reg.exe 1636 reg.exe 1936 reg.exe 672 reg.exe 304 reg.exe 1580 reg.exe 1956 reg.exe 736 reg.exe 1800 reg.exe 1540 reg.exe 740 reg.exe 628 reg.exe 676 reg.exe 112 reg.exe 1072 reg.exe 2020 reg.exe 1188 reg.exe 1940 reg.exe 1960 reg.exe 1580 reg.exe 1152 reg.exe 856 reg.exe 1516 reg.exe 1984 reg.exe 1848 reg.exe 944 reg.exe 1976 reg.exe 1152 reg.exe 1936 reg.exe 1152 reg.exe 1912 reg.exe 332 reg.exe 1732 reg.exe 1692 reg.exe 1544 reg.exe 544 reg.exe 1780 reg.exe 304 reg.exe 304 reg.exe 676 reg.exe 1940 reg.exe 916 reg.exe 888 reg.exe 844 reg.exe 1956 reg.exe 1848 reg.exe 1520 reg.exe 1492 reg.exe 588 reg.exe 1484 reg.exe 1276 reg.exe 588 reg.exe 1540 reg.exe 1172 reg.exe 1540 reg.exe 860 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exepid process 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1764 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1764 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1696 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1696 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 112 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 112 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1028 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1028 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1980 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1980 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 628 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 628 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1696 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1696 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1520 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1520 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 2020 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 2020 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 296 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 296 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1056 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1056 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 2036 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 2036 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1696 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1696 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1496 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1496 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 304 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 304 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1924 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1924 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1688 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1688 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 304 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 304 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 564 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 564 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1576 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1576 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1720 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1720 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1740 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1740 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1544 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1544 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1192 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1192 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1848 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1848 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1544 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1544 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1192 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1192 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1924 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1924 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1576 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1576 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1720 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe 1720 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
BOMYscYQ.exepid process 2028 BOMYscYQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
BOMYscYQ.exepid process 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe 2028 BOMYscYQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.execmd.execmd.exe96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.execmd.execmd.exedescription pid process target process PID 540 wrote to memory of 2004 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PYEwIwsI.exe PID 540 wrote to memory of 2004 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PYEwIwsI.exe PID 540 wrote to memory of 2004 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PYEwIwsI.exe PID 540 wrote to memory of 2004 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PYEwIwsI.exe PID 540 wrote to memory of 2028 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe BOMYscYQ.exe PID 540 wrote to memory of 2028 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe BOMYscYQ.exe PID 540 wrote to memory of 2028 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe BOMYscYQ.exe PID 540 wrote to memory of 2028 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe BOMYscYQ.exe PID 540 wrote to memory of 1976 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 540 wrote to memory of 1976 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 540 wrote to memory of 1976 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 540 wrote to memory of 1976 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1976 wrote to memory of 1176 1976 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1976 wrote to memory of 1176 1976 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1976 wrote to memory of 1176 1976 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1976 wrote to memory of 1176 1976 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 540 wrote to memory of 1844 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1844 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1844 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1844 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1800 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1800 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1800 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1800 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1812 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1812 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1812 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1812 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 540 wrote to memory of 1228 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 540 wrote to memory of 1228 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 540 wrote to memory of 1228 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 540 wrote to memory of 1228 540 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1228 wrote to memory of 604 1228 cmd.exe cscript.exe PID 1228 wrote to memory of 604 1228 cmd.exe cscript.exe PID 1228 wrote to memory of 604 1228 cmd.exe cscript.exe PID 1228 wrote to memory of 604 1228 cmd.exe cscript.exe PID 1176 wrote to memory of 1688 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1176 wrote to memory of 1688 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1176 wrote to memory of 1688 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1176 wrote to memory of 1688 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1688 wrote to memory of 1764 1688 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1688 wrote to memory of 1764 1688 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1688 wrote to memory of 1764 1688 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1688 wrote to memory of 1764 1688 cmd.exe 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe PID 1176 wrote to memory of 640 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 640 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 640 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 640 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1152 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1152 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1152 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1152 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1576 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1576 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1576 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 1576 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe reg.exe PID 1176 wrote to memory of 588 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1176 wrote to memory of 588 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1176 wrote to memory of 588 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 1176 wrote to memory of 588 1176 96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe cmd.exe PID 588 wrote to memory of 464 588 cmd.exe cscript.exe PID 588 wrote to memory of 464 588 cmd.exe cscript.exe PID 588 wrote to memory of 464 588 cmd.exe cscript.exe PID 588 wrote to memory of 464 588 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe"C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\ewIsgswM\PYEwIwsI.exe"C:\Users\Admin\ewIsgswM\PYEwIwsI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\CcYwkkIc\BOMYscYQ.exe"C:\ProgramData\CcYwkkIc\BOMYscYQ.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc43⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc45⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"6⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc47⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"8⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc49⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"10⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc411⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"12⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc413⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"14⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc415⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"16⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc417⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"18⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc419⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"20⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc421⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"22⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc423⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"24⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc425⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"26⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc427⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"28⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc429⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"30⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc431⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"32⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc433⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"34⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc435⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"36⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc437⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"38⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc439⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"40⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc441⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"42⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc443⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"44⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc445⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"46⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc447⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"48⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc449⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"50⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc451⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"52⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc453⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"54⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc455⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"56⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc457⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"58⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc459⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"60⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc461⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"62⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc463⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"64⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc465⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"66⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc467⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"68⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc469⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"70⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc471⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"72⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc473⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"74⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc475⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"76⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc477⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"78⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc479⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"80⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc481⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"82⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc483⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"84⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc485⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"86⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc487⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"88⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc489⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"90⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc491⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"92⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc493⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"94⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc495⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"96⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc497⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"98⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc499⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"100⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4101⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"102⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4103⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"104⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4105⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"106⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4107⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"108⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4109⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"110⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4111⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"112⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4113⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"114⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4115⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"116⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4117⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"118⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4119⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"120⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4121⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"122⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4123⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"124⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4125⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"126⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4127⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"128⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4129⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"130⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4131⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"132⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4133⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"134⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4135⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"136⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4137⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"138⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4139⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"140⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4141⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"142⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4143⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"144⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4145⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"146⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4147⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"148⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4149⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"150⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4151⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"152⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4153⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"154⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4155⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"156⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4157⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"158⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4159⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"160⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4161⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"162⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4163⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"164⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4165⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"166⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4167⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"168⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4169⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"170⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4171⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"172⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4173⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"174⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4175⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"176⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4177⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"178⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4179⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"180⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4181⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"182⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4183⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"184⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4185⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"186⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4187⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"188⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4189⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"190⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4191⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"192⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4193⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"194⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4195⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"196⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4197⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"198⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4199⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"200⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4201⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"202⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4203⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"204⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4205⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"206⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4207⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"208⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4209⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"210⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4211⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"212⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4213⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"214⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4215⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"216⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4217⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"218⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4219⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"220⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4221⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"222⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4223⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"224⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4225⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"226⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4227⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"228⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4229⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"230⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4231⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"232⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4233⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"234⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4235⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"236⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4237⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"238⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4239⤵
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4"240⤵
-
C:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4.exeC:\Users\Admin\AppData\Local\Temp\96d002e9f91400e8522e5d2de7bd353c7bc8672897f3b618ada0d725ca589dc4241⤵