Analysis
-
max time kernel
174s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 12:04
Static task
static1
Behavioral task
behavioral1
Sample
8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe
Resource
win10v2004-20220812-en
General
-
Target
8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe
-
Size
564KB
-
MD5
96608674a01049b54cc2d6d451a86740
-
SHA1
0418d229cefc24cf1524943ec58b0282ef5cf8ca
-
SHA256
8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9
-
SHA512
c591ea310da69997484664f4f13ce7e92ea4f52f4653606ac95a7316d2bfc06afda619ab538bf84a14cacff664622e66df8c704d0f27b3000a7cdeeaa70648c0
-
SSDEEP
12288:uTp9LIfVF9ZSUpPqIpPPuc5DYXeoJKtm3Y6OFvgt6Yf:UbLouUpCcPj5DqeGKxFvgt6m
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\tAQsIYQc\\PasYMUkw.exe," 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\tAQsIYQc\\PasYMUkw.exe," 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 4004 dsAoosUE.exe 2172 PasYMUkw.exe 2324 ggUwYkoc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dsAoosUE.exe = "C:\\Users\\Admin\\YQQAIkQo\\dsAoosUE.exe" 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dsAoosUE.exe = "C:\\Users\\Admin\\YQQAIkQo\\dsAoosUE.exe" dsAoosUE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PasYMUkw.exe = "C:\\ProgramData\\tAQsIYQc\\PasYMUkw.exe" 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PasYMUkw.exe = "C:\\ProgramData\\tAQsIYQc\\PasYMUkw.exe" PasYMUkw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PasYMUkw.exe = "C:\\ProgramData\\tAQsIYQc\\PasYMUkw.exe" ggUwYkoc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\YQQAIkQo ggUwYkoc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\YQQAIkQo\dsAoosUE ggUwYkoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2796 reg.exe 3964 reg.exe 320 reg.exe 2448 reg.exe 2976 reg.exe 1992 reg.exe 1520 reg.exe 4884 reg.exe 2552 reg.exe 5112 reg.exe 4684 reg.exe 4640 reg.exe 5092 reg.exe 3556 reg.exe 3324 reg.exe 5064 reg.exe 1512 reg.exe 3048 reg.exe 3400 reg.exe 3644 reg.exe 3452 reg.exe 3604 reg.exe 1876 reg.exe 712 reg.exe 4984 reg.exe 2088 reg.exe 1904 reg.exe 972 reg.exe 1564 reg.exe 3704 reg.exe 1092 reg.exe 3232 reg.exe 3460 reg.exe 3772 reg.exe 3864 reg.exe 544 reg.exe 5064 reg.exe 1092 reg.exe 1260 reg.exe 1812 reg.exe 2760 reg.exe 3312 reg.exe 4248 reg.exe 3800 reg.exe 3200 reg.exe 1360 reg.exe 3368 reg.exe 3736 reg.exe 4628 reg.exe 1804 reg.exe 2892 reg.exe 3804 reg.exe 3044 reg.exe 5008 reg.exe 4232 reg.exe 3860 reg.exe 1012 reg.exe 4336 reg.exe 3592 reg.exe 1976 reg.exe 2180 reg.exe 3736 reg.exe 2088 reg.exe 1220 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2180 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2180 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2180 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2180 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1772 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1772 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1772 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1772 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3836 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3836 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3836 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3836 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1520 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1520 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1520 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1520 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3720 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3720 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3720 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3720 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1632 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1632 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1632 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1632 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2004 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2004 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2004 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 2004 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1240 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1240 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1240 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1240 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4400 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4400 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4400 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 4400 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3716 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3716 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3716 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 3716 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 1020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 4004 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 81 PID 2424 wrote to memory of 4004 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 81 PID 2424 wrote to memory of 4004 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 81 PID 2424 wrote to memory of 2172 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 82 PID 2424 wrote to memory of 2172 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 82 PID 2424 wrote to memory of 2172 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 82 PID 2424 wrote to memory of 1504 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 84 PID 2424 wrote to memory of 1504 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 84 PID 2424 wrote to memory of 1504 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 84 PID 2424 wrote to memory of 1500 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 86 PID 2424 wrote to memory of 1500 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 86 PID 2424 wrote to memory of 1500 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 86 PID 2424 wrote to memory of 1468 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 91 PID 2424 wrote to memory of 1468 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 91 PID 2424 wrote to memory of 1468 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 91 PID 1504 wrote to memory of 2808 1504 cmd.exe 90 PID 1504 wrote to memory of 2808 1504 cmd.exe 90 PID 1504 wrote to memory of 2808 1504 cmd.exe 90 PID 2424 wrote to memory of 364 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 87 PID 2424 wrote to memory of 364 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 87 PID 2424 wrote to memory of 364 2424 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 87 PID 2808 wrote to memory of 4240 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 93 PID 2808 wrote to memory of 4240 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 93 PID 2808 wrote to memory of 4240 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 93 PID 2808 wrote to memory of 5064 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 95 PID 2808 wrote to memory of 5064 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 95 PID 2808 wrote to memory of 5064 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 95 PID 4240 wrote to memory of 4952 4240 cmd.exe 96 PID 4240 wrote to memory of 4952 4240 cmd.exe 96 PID 4240 wrote to memory of 4952 4240 cmd.exe 96 PID 2808 wrote to memory of 4140 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 99 PID 2808 wrote to memory of 4140 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 99 PID 2808 wrote to memory of 4140 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 99 PID 2808 wrote to memory of 3832 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 100 PID 2808 wrote to memory of 3832 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 100 PID 2808 wrote to memory of 3832 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 100 PID 2808 wrote to memory of 1112 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 102 PID 2808 wrote to memory of 1112 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 102 PID 2808 wrote to memory of 1112 2808 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 102 PID 4952 wrote to memory of 3064 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 97 PID 4952 wrote to memory of 3064 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 97 PID 4952 wrote to memory of 3064 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 97 PID 4952 wrote to memory of 4424 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 106 PID 4952 wrote to memory of 4424 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 106 PID 4952 wrote to memory of 4424 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 106 PID 4952 wrote to memory of 1272 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 107 PID 4952 wrote to memory of 1272 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 107 PID 4952 wrote to memory of 1272 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 107 PID 4952 wrote to memory of 3604 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 110 PID 4952 wrote to memory of 3604 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 110 PID 4952 wrote to memory of 3604 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 110 PID 4952 wrote to memory of 3096 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 108 PID 4952 wrote to memory of 3096 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 108 PID 4952 wrote to memory of 3096 4952 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 108 PID 3064 wrote to memory of 2020 3064 cmd.exe 114 PID 3064 wrote to memory of 2020 3064 cmd.exe 114 PID 3064 wrote to memory of 2020 3064 cmd.exe 114 PID 2020 wrote to memory of 4884 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 115 PID 2020 wrote to memory of 4884 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 115 PID 2020 wrote to memory of 4884 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 115 PID 2020 wrote to memory of 5060 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 116 PID 2020 wrote to memory of 5060 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 116 PID 2020 wrote to memory of 5060 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 116 PID 2020 wrote to memory of 1876 2020 8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe"C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\YQQAIkQo\dsAoosUE.exe"C:\Users\Admin\YQQAIkQo\dsAoosUE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4004
-
-
C:\ProgramData\tAQsIYQc\PasYMUkw.exe"C:\ProgramData\tAQsIYQc\PasYMUkw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"2⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c93⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"4⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c95⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"6⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c97⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"8⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c99⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"10⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c911⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"12⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c913⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"14⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c915⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"16⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c917⤵
- Suspicious behavior: EnumeratesProcesses
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"18⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c919⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"20⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c921⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"22⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c923⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"24⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c925⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"26⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c927⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"28⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c929⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"30⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c931⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"32⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c933⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"34⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c935⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"36⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c937⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"38⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c939⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"40⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c941⤵PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QqUswAos.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""40⤵PID:364
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵PID:216
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
PID:2660
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
- Modifies registry key
PID:3804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
PID:1212
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
- Modifies visibility of file extensions in Explorer
PID:3488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dIEwcgMY.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""38⤵PID:3976
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵PID:3796
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵PID:3848
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rasIsYow.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""36⤵PID:428
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:4084
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
PID:1804
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:2144
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RmcooMwY.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""34⤵PID:3456
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵PID:4384
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
- UAC bypass
PID:2940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:2404
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3232
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
- Modifies registry key
PID:3964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lGAAMMgc.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""32⤵PID:4720
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:3088
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- UAC bypass
PID:1604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:5000
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IUYsYkAo.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""30⤵PID:4732
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:5096
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵PID:2316
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sGwwskkQ.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""28⤵PID:1720
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:1116
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- Modifies registry key
PID:3860
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:2148
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
PID:2036
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:1804
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- UAC bypass
- Modifies registry key
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dgYAgMIU.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""26⤵PID:4212
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:1920
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oIAIEMEA.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""24⤵PID:3804
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:3136
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
PID:3692
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
- Modifies registry key
PID:4232
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵PID:2940
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
PID:4604
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:4640
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
- Modifies registry key
PID:712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NEMUwgsg.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""22⤵PID:1052
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:3496
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵PID:2092
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:4164
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:2916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eosUUIkQ.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""20⤵PID:2256
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:4868
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- Modifies registry key
PID:4628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FYgQAkgE.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""18⤵PID:672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:2368
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CGUYcgQE.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""16⤵PID:5036
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:1560
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:4488
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:1004
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵PID:2940
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵PID:3312
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uwgwwIws.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""14⤵PID:3848
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:3092
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
PID:2796
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:1092
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
PID:1652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QcMIYQsA.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""12⤵PID:4484
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:208
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵PID:1048
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:3428
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
PID:4800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bIAAAogg.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""10⤵PID:4168
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:520
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵PID:5060
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:1876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\csgsoEYc.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""8⤵PID:2520
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4516
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
PID:2680
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵PID:4424
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:1272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TAQkQcAM.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""6⤵PID:3096
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:3396
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- Modifies registry key
PID:3604
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:5064
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:4140
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:3832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MuwkUgks.bat" "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exe""4⤵PID:1112
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3200
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:1500
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:364
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1468
-
-
C:\ProgramData\SGQMEgIk\ggUwYkoc.exeC:\ProgramData\SGQMEgIk\ggUwYkoc.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"1⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c92⤵PID:3812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"3⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c94⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"5⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c96⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"7⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c98⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"9⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c910⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"11⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c912⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"13⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c914⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"15⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c916⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"17⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c918⤵PID:2440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"19⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c920⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"21⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c922⤵PID:996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"23⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c924⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"25⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c926⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"27⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c928⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"29⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c930⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"31⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c932⤵PID:2384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"33⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c934⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"35⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c936⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"37⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c938⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"39⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c940⤵PID:3824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"41⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c942⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"43⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c944⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"45⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c946⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"47⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c948⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"49⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c950⤵PID:424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"51⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c952⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"53⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c954⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"55⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c956⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"57⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c958⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"59⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c960⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"61⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c962⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"63⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c964⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"65⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c966⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"67⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c968⤵PID:1804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"69⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c970⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"71⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c972⤵PID:1752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"73⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c974⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"75⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c976⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"77⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c978⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"79⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c980⤵PID:240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"81⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c982⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"83⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c984⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"85⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c986⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"87⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c988⤵PID:1412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"89⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c990⤵PID:1908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"91⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c992⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"93⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c994⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"95⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c996⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"97⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c998⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"99⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9100⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"101⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9102⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"103⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9104⤵PID:1988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"105⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9106⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"107⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9108⤵PID:1432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"109⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9110⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"111⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9112⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"113⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9114⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"115⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9116⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"117⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9118⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"119⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9120⤵PID:800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9"121⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9.exeC:\Users\Admin\AppData\Local\Temp\8ae0a56fdf894c66cb7dcc25d4eac377acb4d32c8b4c936605d5d0c541a608c9122⤵PID:3084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-