Analysis

  • max time kernel
    160s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 18:47

General

  • Target

    46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe

  • Size

    492KB

  • MD5

    426d0808fba7ead2672669b8b147d2b0

  • SHA1

    091155677efbf5a96e9563010eaa66fa51a76f0e

  • SHA256

    46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

  • SHA512

    b7a83d17e6f6015c33b11fe41ae5ab8991a0f6b777302b904bac0ae4c47bb44e608aac1ed51a27c6bce1ace28a3548c216c368e6c60328846cc6f84a119e7127

  • SSDEEP

    12288:RExZBv+laj7498Wdt/qgyNsgcdvud9+CQUYfGAyGl:uxZBv+laNst/qgyNTd9+aYui

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 35 IoCs
  • UAC bypass 3 TTPs 35 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
    "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4316
    • C:\Users\Admin\VuwoEUYc\JyoUcEko.exe
      "C:\Users\Admin\VuwoEUYc\JyoUcEko.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:2096
    • C:\ProgramData\NmwUEMwY\NKskQwwo.exe
      "C:\ProgramData\NmwUEMwY\NKskQwwo.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3624
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3700
      • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
        C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:988
          • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
            C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4240
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4704
              • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1688
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                  8⤵
                    PID:376
                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                      9⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4904
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                        10⤵
                          PID:3436
                          • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                            C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                            11⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3984
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                              12⤵
                                PID:2308
                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                  C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                  13⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4412
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                    14⤵
                                      PID:3296
                                      • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                        C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                        15⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1172
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                          16⤵
                                            PID:3088
                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                              17⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3712
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                18⤵
                                                  PID:4020
                                                  • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                    C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                    19⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:624
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                      20⤵
                                                        PID:4228
                                                        • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                          C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                          21⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4532
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                            22⤵
                                                              PID:4364
                                                              • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                23⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1984
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                  24⤵
                                                                    PID:616
                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                      25⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:3424
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                        26⤵
                                                                          PID:2512
                                                                          • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                            27⤵
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:3164
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                              28⤵
                                                                                PID:2984
                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                  29⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:4240
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                    30⤵
                                                                                      PID:4760
                                                                                      • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                        31⤵
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:2292
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                          32⤵
                                                                                            PID:1612
                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                              33⤵
                                                                                                PID:4256
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                  34⤵
                                                                                                    PID:3444
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                      35⤵
                                                                                                        PID:864
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                          36⤵
                                                                                                            PID:1580
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                              37⤵
                                                                                                                PID:3536
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                  38⤵
                                                                                                                    PID:4904
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                      39⤵
                                                                                                                        PID:2308
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                          40⤵
                                                                                                                            PID:4964
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                              41⤵
                                                                                                                                PID:4884
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                  42⤵
                                                                                                                                    PID:1548
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                      43⤵
                                                                                                                                        PID:544
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                          44⤵
                                                                                                                                            PID:4820
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                              45⤵
                                                                                                                                                PID:2244
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                  46⤵
                                                                                                                                                    PID:3536
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                      47⤵
                                                                                                                                                        PID:1192
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                          48⤵
                                                                                                                                                            PID:768
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                              49⤵
                                                                                                                                                                PID:4628
                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                  50⤵
                                                                                                                                                                    PID:4004
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                      51⤵
                                                                                                                                                                        PID:4964
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                          52⤵
                                                                                                                                                                            PID:1680
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                              53⤵
                                                                                                                                                                                PID:752
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                  54⤵
                                                                                                                                                                                    PID:2920
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                      55⤵
                                                                                                                                                                                        PID:4688
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                          56⤵
                                                                                                                                                                                            PID:1332
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                              57⤵
                                                                                                                                                                                                PID:2072
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                  58⤵
                                                                                                                                                                                                    PID:3508
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                                      59⤵
                                                                                                                                                                                                        PID:4904
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                            PID:2328
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                                              61⤵
                                                                                                                                                                                                                PID:4716
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                    PID:4020
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                                                      63⤵
                                                                                                                                                                                                                        PID:2188
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                                          64⤵
                                                                                                                                                                                                                            PID:2412
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                                                              65⤵
                                                                                                                                                                                                                                PID:1984
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                                                  66⤵
                                                                                                                                                                                                                                    PID:4364
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                                                                      67⤵
                                                                                                                                                                                                                                        PID:3728
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                                                          68⤵
                                                                                                                                                                                                                                            PID:376
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe
                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c
                                                                                                                                                                                                                                              69⤵
                                                                                                                                                                                                                                                PID:4220
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c"
                                                                                                                                                                                                                                                  70⤵
                                                                                                                                                                                                                                                    PID:4308
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xcIcIoYY.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    70⤵
                                                                                                                                                                                                                                                      PID:1288
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        71⤵
                                                                                                                                                                                                                                                          PID:4548
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        70⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:1012
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                        70⤵
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:3032
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                        70⤵
                                                                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                        PID:4824
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fogUAokQ.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    68⤵
                                                                                                                                                                                                                                                      PID:1944
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        69⤵
                                                                                                                                                                                                                                                          PID:2420
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        68⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        PID:4856
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                        68⤵
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:3584
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                        68⤵
                                                                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                        PID:4132
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jgUYwQUg.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    66⤵
                                                                                                                                                                                                                                                      PID:912
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        67⤵
                                                                                                                                                                                                                                                          PID:2804
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        66⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:4868
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                        66⤵
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:4280
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                        66⤵
                                                                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                        PID:1276
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PoMgUQwE.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    64⤵
                                                                                                                                                                                                                                                      PID:4688
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        65⤵
                                                                                                                                                                                                                                                          PID:4788
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        64⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:3308
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                        64⤵
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:4092
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                        64⤵
                                                                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:4604
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pAEwMkAA.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    62⤵
                                                                                                                                                                                                                                                      PID:4476
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        63⤵
                                                                                                                                                                                                                                                          PID:2308
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        62⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        PID:4052
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                        62⤵
                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                        PID:1752
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                        62⤵
                                                                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                        PID:1960
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                    60⤵
                                                                                                                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                                                                                    PID:1640
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                    60⤵
                                                                                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                                                                                    PID:3628
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MugswsoU.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    60⤵
                                                                                                                                                                                                                                                      PID:4164
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        61⤵
                                                                                                                                                                                                                                                          PID:424
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        60⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        PID:4856
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qiEcggIs.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                    58⤵
                                                                                                                                                                                                                                                      PID:4588
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                        59⤵
                                                                                                                                                                                                                                                          PID:4596
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                        PID:4912
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                                                                          PID:880
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                          58⤵
                                                                                                                                                                                                                                                          • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:1172
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eeUwoIgQ.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                      56⤵
                                                                                                                                                                                                                                                        PID:1108
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                          cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                          57⤵
                                                                                                                                                                                                                                                            PID:1276
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:2056
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                          56⤵
                                                                                                                                                                                                                                                            PID:4944
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                            56⤵
                                                                                                                                                                                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                                                                            PID:4532
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PMYkQoQQ.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                        54⤵
                                                                                                                                                                                                                                                          PID:2176
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                            cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                            55⤵
                                                                                                                                                                                                                                                              PID:4604
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                            54⤵
                                                                                                                                                                                                                                                            • UAC bypass
                                                                                                                                                                                                                                                            PID:4476
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                            54⤵
                                                                                                                                                                                                                                                              PID:2120
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                              54⤵
                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                              PID:4240
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VSMUEQkc.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                          52⤵
                                                                                                                                                                                                                                                            PID:4776
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                              53⤵
                                                                                                                                                                                                                                                                PID:1132
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                              52⤵
                                                                                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                                                                                              PID:2400
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                              52⤵
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:4132
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                              52⤵
                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:3164
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IkQkMMUI.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                          50⤵
                                                                                                                                                                                                                                                            PID:4808
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                              51⤵
                                                                                                                                                                                                                                                                PID:1624
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                              50⤵
                                                                                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                                                                                              PID:4260
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                              50⤵
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:4868
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                              50⤵
                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:5012
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:4324
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OEgIQMwk.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                                                                            PID:4800
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                              49⤵
                                                                                                                                                                                                                                                                PID:4620
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                              48⤵
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:3940
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                              48⤵
                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:4500
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                          46⤵
                                                                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:1316
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uuIcEEoc.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                          46⤵
                                                                                                                                                                                                                                                            PID:4812
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                              47⤵
                                                                                                                                                                                                                                                                PID:4300
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                              46⤵
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:3144
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                              46⤵
                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:1768
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:3420
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:1920
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                                                          • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:2816
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fGYIEckk.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                                                            PID:4448
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                              45⤵
                                                                                                                                                                                                                                                                PID:4896
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                          42⤵
                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                          PID:4704
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HykwAIEs.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                          42⤵
                                                                                                                                                                                                                                                            PID:616
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                              43⤵
                                                                                                                                                                                                                                                                PID:3200
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                              42⤵
                                                                                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:1512
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                              42⤵
                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                              PID:1172
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                          40⤵
                                                                                                                                                                                                                                                            PID:2788
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JEscMkkI.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                            40⤵
                                                                                                                                                                                                                                                              PID:2188
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                41⤵
                                                                                                                                                                                                                                                                  PID:4256
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                40⤵
                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                PID:1152
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                40⤵
                                                                                                                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                PID:4952
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mkAkoowE.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                            38⤵
                                                                                                                                                                                                                                                              PID:3436
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                39⤵
                                                                                                                                                                                                                                                                  PID:4280
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                38⤵
                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                PID:4812
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                38⤵
                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                PID:3924
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                38⤵
                                                                                                                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                PID:1724
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RWscYkMM.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                            36⤵
                                                                                                                                                                                                                                                              PID:996
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                37⤵
                                                                                                                                                                                                                                                                  PID:1200
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                36⤵
                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                PID:636
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                36⤵
                                                                                                                                                                                                                                                                  PID:4856
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                  36⤵
                                                                                                                                                                                                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:4132
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RoQYQwcw.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                              34⤵
                                                                                                                                                                                                                                                                PID:4948
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                  35⤵
                                                                                                                                                                                                                                                                    PID:2244
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                  34⤵
                                                                                                                                                                                                                                                                  • UAC bypass
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:4512
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                  34⤵
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:2016
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                  34⤵
                                                                                                                                                                                                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                  PID:1012
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                              32⤵
                                                                                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                                                                                              PID:880
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XuccYwQE.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                              32⤵
                                                                                                                                                                                                                                                                PID:4300
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                  33⤵
                                                                                                                                                                                                                                                                    PID:3548
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                  32⤵
                                                                                                                                                                                                                                                                    PID:5040
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                    32⤵
                                                                                                                                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                    PID:4792
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                30⤵
                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                PID:4228
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                30⤵
                                                                                                                                                                                                                                                                  PID:2336
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eOAQgcwA.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                  30⤵
                                                                                                                                                                                                                                                                    PID:4608
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                      31⤵
                                                                                                                                                                                                                                                                        PID:4964
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                      30⤵
                                                                                                                                                                                                                                                                      • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                      • Modifies registry key
                                                                                                                                                                                                                                                                      PID:3100
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                  28⤵
                                                                                                                                                                                                                                                                  • UAC bypass
                                                                                                                                                                                                                                                                  PID:1836
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                  28⤵
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:4800
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                  28⤵
                                                                                                                                                                                                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:4956
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YkcoggMQ.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                  28⤵
                                                                                                                                                                                                                                                                    PID:4116
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                      29⤵
                                                                                                                                                                                                                                                                        PID:3924
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                  26⤵
                                                                                                                                                                                                                                                                  • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                  PID:4332
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                  26⤵
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:3652
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OCsIQowo.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                  26⤵
                                                                                                                                                                                                                                                                    PID:3712
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                      27⤵
                                                                                                                                                                                                                                                                        PID:3356
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                      26⤵
                                                                                                                                                                                                                                                                      • UAC bypass
                                                                                                                                                                                                                                                                      • Modifies registry key
                                                                                                                                                                                                                                                                      PID:4164
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                  24⤵
                                                                                                                                                                                                                                                                  • UAC bypass
                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                  PID:4452
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                  24⤵
                                                                                                                                                                                                                                                                    PID:4792
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                    24⤵
                                                                                                                                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                    PID:4300
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DycoYUAA.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                    24⤵
                                                                                                                                                                                                                                                                      PID:1172
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                        25⤵
                                                                                                                                                                                                                                                                          PID:3444
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JIokQsgA.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                    22⤵
                                                                                                                                                                                                                                                                      PID:1204
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                        23⤵
                                                                                                                                                                                                                                                                          PID:4504
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                        22⤵
                                                                                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                                        PID:2696
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                        22⤵
                                                                                                                                                                                                                                                                          PID:1536
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                          22⤵
                                                                                                                                                                                                                                                                          • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                                          PID:1108
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vEUEEQsQ.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                      20⤵
                                                                                                                                                                                                                                                                        PID:1544
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                          cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                          21⤵
                                                                                                                                                                                                                                                                            PID:4600
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                          20⤵
                                                                                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                                                                                          PID:4968
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                          20⤵
                                                                                                                                                                                                                                                                            PID:1748
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                            20⤵
                                                                                                                                                                                                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                            PID:1784
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                        18⤵
                                                                                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                                                                                        PID:4904
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                        18⤵
                                                                                                                                                                                                                                                                          PID:3864
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                          18⤵
                                                                                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                                                                                          PID:544
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OcccQkAs.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                          18⤵
                                                                                                                                                                                                                                                                            PID:876
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                              19⤵
                                                                                                                                                                                                                                                                                PID:1432
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                          16⤵
                                                                                                                                                                                                                                                                          • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                          PID:4548
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                          16⤵
                                                                                                                                                                                                                                                                            PID:532
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WyAIYAwU.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                            16⤵
                                                                                                                                                                                                                                                                              PID:4280
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                17⤵
                                                                                                                                                                                                                                                                                  PID:800
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                                16⤵
                                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                                PID:4948
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                            14⤵
                                                                                                                                                                                                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                                                                                            PID:2696
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                            14⤵
                                                                                                                                                                                                                                                                            • UAC bypass
                                                                                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                                                                                            PID:1640
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WgUYcMMQ.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                            14⤵
                                                                                                                                                                                                                                                                              PID:2332
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                15⤵
                                                                                                                                                                                                                                                                                  PID:3676
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                                14⤵
                                                                                                                                                                                                                                                                                  PID:4092
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                              12⤵
                                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                                              PID:4476
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                              12⤵
                                                                                                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                                              PID:2400
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                              12⤵
                                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                                              PID:4892
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vWwkIEEs.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                              12⤵
                                                                                                                                                                                                                                                                                PID:1788
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                  13⤵
                                                                                                                                                                                                                                                                                    PID:3460
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                                              PID:1648
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                                                PID:3940
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fyYIokUc.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                                10⤵
                                                                                                                                                                                                                                                                                  PID:212
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                    cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                    11⤵
                                                                                                                                                                                                                                                                                      PID:752
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                                    10⤵
                                                                                                                                                                                                                                                                                    • UAC bypass
                                                                                                                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                                                                                                                    PID:3896
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                                PID:3128
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                                PID:5040
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                                PID:4300
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vaAYcsYo.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                  PID:4584
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                    cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                                                                      PID:1356
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                                PID:1004
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:4868
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                  • UAC bypass
                                                                                                                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                                                                                                                  PID:1640
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OmYMwYUc.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                  PID:4952
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                    cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                                                                      PID:4596
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                                PID:4652
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                • UAC bypass
                                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                                PID:1596
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                                                                                                                PID:1788
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KigUQQYk.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                PID:3060
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                    PID:3528
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                                              PID:2316
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                              • UAC bypass
                                                                                                                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                                                                                                                              PID:2044
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:3100
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dYIsYscE.bat" "C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c.exe""
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:3200
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                                                                                                    cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                      PID:2788
                                                                                                                                                                                                                                                                                • C:\ProgramData\tiscogEE\KgQcUccc.exe
                                                                                                                                                                                                                                                                                  C:\ProgramData\tiscogEE\KgQcUccc.exe
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                                                                                  PID:4444

                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                • C:\ProgramData\NmwUEMwY\NKskQwwo.exe

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  479KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  97a7f78c9186f7f5dcd245abd3de50ad

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  00412123fb80a18d26c589b573cdb8ec8566d42e

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  4425f8879dc33aa187f44cb972ba0b7626bb40d590c9434df7c1ddf9b39bfd38

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  08b6bcdda00e6d12eb07a376220e8305b64b87725ab5bec448bf55c289b640fda599589f896705a53fd30fc02cac8d840a5f05ad859977ad0aef093b49c8f827

                                                                                                                                                                                                                                                                                • C:\ProgramData\NmwUEMwY\NKskQwwo.exe

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  479KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  97a7f78c9186f7f5dcd245abd3de50ad

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  00412123fb80a18d26c589b573cdb8ec8566d42e

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  4425f8879dc33aa187f44cb972ba0b7626bb40d590c9434df7c1ddf9b39bfd38

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  08b6bcdda00e6d12eb07a376220e8305b64b87725ab5bec448bf55c289b640fda599589f896705a53fd30fc02cac8d840a5f05ad859977ad0aef093b49c8f827

                                                                                                                                                                                                                                                                                • C:\ProgramData\tiscogEE\KgQcUccc.exe

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  481KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  42ef7b97364dcbfeb4fe1b8c7fc48393

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  06768d74ae9d9acac8b36b4c3609be48a208bd38

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  568eac0967b0ca874ba0780758391b7981334c8524621581eeef88662e219cba

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  588b5d1a198d7c60a34c03598a45c6d33fd084cee1abd37f9378f7d69ced2d480852ba7092a693e337927258a3dda302959b7cef3026a74c5f2d62fb4cfa00bf

                                                                                                                                                                                                                                                                                • C:\ProgramData\tiscogEE\KgQcUccc.exe

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  481KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  42ef7b97364dcbfeb4fe1b8c7fc48393

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  06768d74ae9d9acac8b36b4c3609be48a208bd38

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  568eac0967b0ca874ba0780758391b7981334c8524621581eeef88662e219cba

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  588b5d1a198d7c60a34c03598a45c6d33fd084cee1abd37f9378f7d69ced2d480852ba7092a693e337927258a3dda302959b7cef3026a74c5f2d62fb4cfa00bf

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\46de1899c1ab21e1254dbb1eee5a25ced46629e9a96f85688dd17b4434fdee8c

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  1c17c162defdab9d945161e028a65b7b

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  57b06993552a571eaacddb9836b72525120b04db

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ac791b7dd63587134076d1b62f91de3710266be921b04f89c0ac4840d6531ef4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  e1ac6cd5fc6970da778931f41aad2c980829a97af12eac6c1792539bc65146f680b17ec21bbec2a4ba34e8770d563e3467ac787dbb5a81dd9dc04b7bde9b7ed5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\DycoYUAA.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\JEscMkkI.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\JIokQsgA.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\KigUQQYk.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\OCsIQowo.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\OcccQkAs.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\OmYMwYUc.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RWscYkMM.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RoQYQwcw.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\WgUYcMMQ.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\WyAIYAwU.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\XuccYwQE.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\YkcoggMQ.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\eOAQgcwA.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  19B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\fyYIokUc.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mkAkoowE.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vEUEEQsQ.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vWwkIEEs.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vaAYcsYo.bat

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  112B

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  bae1095f340720d965898063fede1273

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                                                                                                • C:\Users\Admin\VuwoEUYc\JyoUcEko.exe

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  481KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  d99a8f5d6e6fbcaee05051a80e10ae07

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  2f1d9c715fc0966a1ee1d05465afa15b6fe4ebd6

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  b20885f990bfa4a22c218e362d7bd45c68ca36dae1d938ee849f6ead169e62d4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  55f07ef76a843b2c0b7c7ca660f24f79a84c4c4818ab6c05ecdc4ac19ad3a5fe8a5be7d5416773d93ce99f405f1771c3ced8da8b4eec7bb2c388691187c07880

                                                                                                                                                                                                                                                                                • C:\Users\Admin\VuwoEUYc\JyoUcEko.exe

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  481KB

                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                  d99a8f5d6e6fbcaee05051a80e10ae07

                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                  2f1d9c715fc0966a1ee1d05465afa15b6fe4ebd6

                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                  b20885f990bfa4a22c218e362d7bd45c68ca36dae1d938ee849f6ead169e62d4

                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                  55f07ef76a843b2c0b7c7ca660f24f79a84c4c4818ab6c05ecdc4ac19ad3a5fe8a5be7d5416773d93ce99f405f1771c3ced8da8b4eec7bb2c388691187c07880

                                                                                                                                                                                                                                                                                • memory/544-297-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/624-242-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/752-302-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/752-303-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/864-280-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/864-277-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1172-224-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1192-299-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1688-171-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1688-178-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1984-248-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1984-312-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/1984-250-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2072-306-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2096-271-0x0000000000400000-0x000000000047B000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  492KB

                                                                                                                                                                                                                                                                                • memory/2096-142-0x0000000000400000-0x000000000047B000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  492KB

                                                                                                                                                                                                                                                                                • memory/2188-310-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2188-311-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2244-298-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2292-270-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2308-289-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/2308-291-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3164-260-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3164-257-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3424-255-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3536-284-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3536-286-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3624-143-0x0000000000400000-0x000000000047B000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  492KB

                                                                                                                                                                                                                                                                                • memory/3624-272-0x0000000000400000-0x000000000047B000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  492KB

                                                                                                                                                                                                                                                                                • memory/3712-234-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3728-314-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/3984-202-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4220-315-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4228-155-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4240-264-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4240-266-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4240-166-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4256-275-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4316-132-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4316-263-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4316-313-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4412-203-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4412-210-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4444-144-0x0000000000400000-0x000000000047B000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  492KB

                                                                                                                                                                                                                                                                                • memory/4532-245-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4628-300-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4688-305-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4688-304-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4716-309-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4884-292-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4884-296-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4904-190-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4904-307-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4904-308-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4904-185-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                • memory/4964-301-0x0000000000400000-0x000000000047F000-memory.dmp

                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                  508KB