Analysis
-
max time kernel
58s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2022 02:53
Static task
static1
Behavioral task
behavioral1
Sample
c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe
Resource
win10v2004-20221111-en
General
-
Target
c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe
-
Size
588KB
-
MD5
e2cf99bafbaf97caeb1e168f08d5b9a7
-
SHA1
93e3f7a0a438ed62058fafecce927960959e64cc
-
SHA256
c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45
-
SHA512
ea6b44e5c0381f8c5febecfc114f643871b0d765e9fff7b185d2d8b43de2845e9dcf3f490ccc28fe6b2b07d4396aeccba541fc40d11c7b0c0d979ad6ce5c591b
-
SSDEEP
12288:NeRtB1zxiB1UOab0y8msR/UWyUAMF95ofKxsS+/Oym/+L:uj1xiB1Dab0yiUW1AYSKGSgiWL
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
bd.exewindow.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5036 bd.exe 2556 window.exe 1108 taskkill.exe 2008 taskkill.exe 4392 taskkill.exe 5104 taskkill.exe 204 taskkill.exe 3640 taskkill.exe 1352 taskkill.exe 1004 taskkill.exe 3512 taskkill.exe 3068 taskkill.exe 2316 taskkill.exe 2760 taskkill.exe 4428 taskkill.exe 4064 taskkill.exe 556 taskkill.exe 932 taskkill.exe 1836 taskkill.exe 1384 taskkill.exe 3488 taskkill.exe 5160 taskkill.exe 5292 taskkill.exe 5452 taskkill.exe 5616 taskkill.exe 5748 taskkill.exe 5876 taskkill.exe 5980 taskkill.exe 6096 taskkill.exe 5380 taskkill.exe 1308 taskkill.exe 5840 taskkill.exe 6108 taskkill.exe 2264 taskkill.exe 6172 taskkill.exe 6260 taskkill.exe 6364 taskkill.exe 6456 taskkill.exe 6544 taskkill.exe 6632 taskkill.exe 6748 taskkill.exe 6936 taskkill.exe 7064 taskkill.exe 7152 taskkill.exe 6660 taskkill.exe 7172 taskkill.exe 7260 taskkill.exe 7352 taskkill.exe 7444 taskkill.exe 7536 taskkill.exe 7652 taskkill.exe 7756 taskkill.exe 7844 taskkill.exe 7968 taskkill.exe 8056 taskkill.exe 8160 taskkill.exe 7648 taskkill.exe 8024 taskkill.exe 5272 taskkill.exe 8208 taskkill.exe 8304 taskkill.exe 8392 taskkill.exe 8516 taskkill.exe 8608 taskkill.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 556 takeown.exe 3356 icacls.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bd.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bd.exe upx behavioral2/memory/5036-136-0x0000000140000000-0x0000000140049000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/1108-144-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/2008-155-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/4392-156-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/5104-177-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/204-178-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/3640-179-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/1352-180-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/1004-181-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/3512-202-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/3068-203-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/2316-204-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/2760-205-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/4428-206-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/4064-223-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/556-224-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/932-225-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/1836-226-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/1384-247-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/3488-248-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/5160-249-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/5292-250-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/5452-251-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/5616-257-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/5748-269-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/5876-270-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/5980-271-0x0000000140000000-0x0000000140027000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe upx behavioral2/memory/5380-286-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/6096-285-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/1308-287-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/5840-290-0x0000000140000000-0x0000000140027000-memory.dmp upx behavioral2/memory/6108-291-0x0000000140000000-0x0000000140027000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation taskkill.exe -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 556 takeown.exe 3356 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5748 taskkill.exe 5876 taskkill.exe 7152 taskkill.exe 8448 taskkill.exe 9380 taskkill.exe 9468 taskkill.exe 9960 taskkill.exe 11376 taskkill.exe 11680 taskkill.exe 7836 taskkill.exe 2564 taskkill.exe 15884 taskkill.exe 2760 taskkill.exe 7444 taskkill.exe 10636 taskkill.exe 11004 taskkill.exe 16340 taskkill.exe 3640 taskkill.exe 4064 taskkill.exe 5616 taskkill.exe 5380 taskkill.exe 1308 taskkill.exe 6544 taskkill.exe 7172 taskkill.exe 10988 taskkill.exe 11772 taskkill.exe 16388 taskkill.exe 8056 taskkill.exe 5272 taskkill.exe 14668 taskkill.exe 15528 taskkill.exe 7064 taskkill.exe 7844 taskkill.exe 12876 taskkill.exe 9264 taskkill.exe 2280 taskkill.exe 6008 taskkill.exe 11964 taskkill.exe 15536 taskkill.exe 16120 taskkill.exe 5104 taskkill.exe 3512 taskkill.exe 6260 taskkill.exe 7648 taskkill.exe 10336 taskkill.exe 4392 taskkill.exe 7652 taskkill.exe 14060 taskkill.exe 556 taskkill.exe 8672 taskkill.exe 12244 taskkill.exe 13832 taskkill.exe 9360 taskkill.exe 6632 taskkill.exe 8800 taskkill.exe 9188 taskkill.exe 4612 taskkill.exe 11468 taskkill.exe 12964 taskkill.exe 14828 taskkill.exe 14852 taskkill.exe 7536 taskkill.exe 12316 taskkill.exe 14236 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
takeown.exedescription pid process Token: SeTakeOwnershipPrivilege 556 takeown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
window.exepid process 2556 window.exe 2556 window.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exebd.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exetaskkill.execmd.exedescription pid process target process PID 2632 wrote to memory of 5036 2632 c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe bd.exe PID 2632 wrote to memory of 5036 2632 c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe bd.exe PID 5036 wrote to memory of 4244 5036 bd.exe cmd.exe PID 5036 wrote to memory of 4244 5036 bd.exe cmd.exe PID 4244 wrote to memory of 2556 4244 cmd.exe window.exe PID 4244 wrote to memory of 2556 4244 cmd.exe window.exe PID 4244 wrote to memory of 2556 4244 cmd.exe window.exe PID 4244 wrote to memory of 1108 4244 cmd.exe taskkill.exe PID 4244 wrote to memory of 1108 4244 cmd.exe taskkill.exe PID 4244 wrote to memory of 556 4244 cmd.exe takeown.exe PID 4244 wrote to memory of 556 4244 cmd.exe takeown.exe PID 4244 wrote to memory of 3356 4244 cmd.exe icacls.exe PID 4244 wrote to memory of 3356 4244 cmd.exe icacls.exe PID 1108 wrote to memory of 972 1108 taskkill.exe cmd.exe PID 1108 wrote to memory of 972 1108 taskkill.exe cmd.exe PID 972 wrote to memory of 2008 972 cmd.exe taskkill.exe PID 972 wrote to memory of 2008 972 cmd.exe taskkill.exe PID 2008 wrote to memory of 2148 2008 taskkill.exe cmd.exe PID 2008 wrote to memory of 2148 2008 taskkill.exe cmd.exe PID 2148 wrote to memory of 4392 2148 cmd.exe taskkill.exe PID 2148 wrote to memory of 4392 2148 cmd.exe taskkill.exe PID 4392 wrote to memory of 4388 4392 taskkill.exe cmd.exe PID 4392 wrote to memory of 4388 4392 taskkill.exe cmd.exe PID 4388 wrote to memory of 5104 4388 cmd.exe taskkill.exe PID 4388 wrote to memory of 5104 4388 cmd.exe taskkill.exe PID 5104 wrote to memory of 2996 5104 taskkill.exe cmd.exe PID 5104 wrote to memory of 2996 5104 taskkill.exe cmd.exe PID 2996 wrote to memory of 204 2996 cmd.exe taskkill.exe PID 2996 wrote to memory of 204 2996 cmd.exe taskkill.exe PID 204 wrote to memory of 3880 204 taskkill.exe cmd.exe PID 204 wrote to memory of 3880 204 taskkill.exe cmd.exe PID 3880 wrote to memory of 3640 3880 cmd.exe taskkill.exe PID 3880 wrote to memory of 3640 3880 cmd.exe taskkill.exe PID 3640 wrote to memory of 3648 3640 taskkill.exe cmd.exe PID 3640 wrote to memory of 3648 3640 taskkill.exe cmd.exe PID 3648 wrote to memory of 1352 3648 cmd.exe taskkill.exe PID 3648 wrote to memory of 1352 3648 cmd.exe taskkill.exe PID 1352 wrote to memory of 4444 1352 taskkill.exe cmd.exe PID 1352 wrote to memory of 4444 1352 taskkill.exe cmd.exe PID 4444 wrote to memory of 1004 4444 cmd.exe taskkill.exe PID 4444 wrote to memory of 1004 4444 cmd.exe taskkill.exe PID 1004 wrote to memory of 4144 1004 taskkill.exe cmd.exe PID 1004 wrote to memory of 4144 1004 taskkill.exe cmd.exe PID 4144 wrote to memory of 3512 4144 cmd.exe taskkill.exe PID 4144 wrote to memory of 3512 4144 cmd.exe taskkill.exe PID 3512 wrote to memory of 2260 3512 taskkill.exe cmd.exe PID 3512 wrote to memory of 2260 3512 taskkill.exe cmd.exe PID 2260 wrote to memory of 3068 2260 cmd.exe taskkill.exe PID 2260 wrote to memory of 3068 2260 cmd.exe taskkill.exe PID 3068 wrote to memory of 3148 3068 taskkill.exe cmd.exe PID 3068 wrote to memory of 3148 3068 taskkill.exe cmd.exe PID 3148 wrote to memory of 2316 3148 cmd.exe taskkill.exe PID 3148 wrote to memory of 2316 3148 cmd.exe taskkill.exe PID 2316 wrote to memory of 4524 2316 taskkill.exe cmd.exe PID 2316 wrote to memory of 4524 2316 taskkill.exe cmd.exe PID 4524 wrote to memory of 2760 4524 cmd.exe taskkill.exe PID 4524 wrote to memory of 2760 4524 cmd.exe taskkill.exe PID 2760 wrote to memory of 2964 2760 taskkill.exe cmd.exe PID 2760 wrote to memory of 2964 2760 taskkill.exe cmd.exe PID 2964 wrote to memory of 4428 2964 cmd.exe taskkill.exe PID 2964 wrote to memory of 4428 2964 cmd.exe taskkill.exe PID 4428 wrote to memory of 3492 4428 taskkill.exe cmd.exe PID 4428 wrote to memory of 3492 4428 taskkill.exe cmd.exe PID 3492 wrote to memory of 4064 3492 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe"C:\Users\Admin\AppData\Local\Temp\c13a77c04a9e6d13275c98f60b63cd2415c622b96bdd31ddfb600d2e6c798d45.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\675A.tmp\675B.tmp\675C.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bd.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\window.exewindow.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6DC2.tmp\6DC3.tmp\6DC4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6ECC.tmp\6ECD.tmp\6ECE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f8⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6FF5.tmp\6FF6.tmp\6FF7.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"9⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f10⤵
- Executes dropped EXE
- Kills process with taskkill
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\715C.tmp\715D.tmp\715E.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"11⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7227.tmp\7228.tmp\7229.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"13⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f14⤵
- Executes dropped EXE
- Kills process with taskkill
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\72F2.tmp\72F3.tmp\72F4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"15⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f16⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\738F.tmp\7390.tmp\7391.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"17⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\742B.tmp\742C.tmp\742D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"19⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f20⤵
- Executes dropped EXE
- Kills process with taskkill
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7506.tmp\7507.tmp\7508.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"21⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f22⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\75D1.tmp\75E1.tmp\75E2.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"23⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f24⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\76BB.tmp\76CC.tmp\76CD.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"25⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f26⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7786.tmp\7787.tmp\7788.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"27⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f28⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7842.tmp\7843.tmp\7844.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"29⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f30⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\79C8.tmp\79C9.tmp\79EA.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"31⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f32⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7AE2.tmp\7AE3.tmp\7AF3.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"33⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f34⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7BBC.tmp\7BBD.tmp\7BBE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"35⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f36⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7CD6.tmp\7CD7.tmp\7CD8.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"37⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f38⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7DEF.tmp\7E00.tmp\7E01.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"39⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f40⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7EBA.tmp\7EBB.tmp\7EBC.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"41⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f42⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7F76.tmp\7F77.tmp\7F78.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"43⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f44⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8050.tmp\8051.tmp\8052.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"45⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f46⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8179.tmp\81C8.tmp\81C9.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"47⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f48⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\836D.tmp\84C6.tmp\84D7.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"49⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f50⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\86C9.tmp\8708.tmp\8709.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"51⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f52⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\885F.tmp\8860.tmp\8861.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"53⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f54⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\89E5.tmp\89E6.tmp\89E7.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"55⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f56⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8B3D.tmp\8B3E.tmp\8B3F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"57⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f58⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8C37.tmp\8C38.tmp\8C39.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"59⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f60⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8D7F.tmp\8D80.tmp\8D81.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"61⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f62⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8ED7.tmp\8ED8.tmp\8ED9.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"63⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f64⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8FF0.tmp\8FF1.tmp\8FF2.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"65⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f66⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\90DB.tmp\90DC.tmp\90DD.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"67⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f68⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9187.tmp\9188.tmp\9189.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"69⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f70⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9242.tmp\9253.tmp\9254.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"71⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f72⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\937B.tmp\937C.tmp\937D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"73⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f74⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9446.tmp\9447.tmp\9448.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"75⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f76⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\956F.tmp\9570.tmp\9571.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"77⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f78⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9669.tmp\966A.tmp\966B.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"79⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f80⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\980E.tmp\980F.tmp\9810.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"81⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f82⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\98F9.tmp\98FA.tmp\98FB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"83⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f84⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\99E3.tmp\99E4.tmp\99E5.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"85⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f86⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9A7F.tmp\9A90.tmp\9A91.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"87⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f88⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9B89.tmp\9B8A.tmp\9B8B.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"89⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f90⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9C25.tmp\9C26.tmp\9C27.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"91⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f92⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9CC2.tmp\9CC3.tmp\9CC4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"93⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f94⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9D7D.tmp\9D7E.tmp\9D7F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"95⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f96⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9E29.tmp\9E2A.tmp\9E2B.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"97⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f98⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9ED5.tmp\9ED6.tmp\9ED7.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"99⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f100⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9FBF.tmp\9FDF.tmp\9FE0.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"101⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f102⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A0E8.tmp\A0E9.tmp\A0EA.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"103⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f104⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A25F.tmp\A270.tmp\A271.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"105⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f106⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C5F4.tmp\C5F5.tmp\C5F6.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"107⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f108⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C6DF.tmp\C6E0.tmp\C6E1.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"109⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f110⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C76B.tmp\C76C.tmp\C76D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"111⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f112⤵
- Executes dropped EXE
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C8D3.tmp\C8D4.tmp\C8D5.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"113⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f114⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C9AE.tmp\C9AF.tmp\C9B0.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"115⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f116⤵
- Executes dropped EXE
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CA59.tmp\CA5A.tmp\CA5B.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"117⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f118⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CB15.tmp\CB16.tmp\CB17.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"119⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f120⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CB82.tmp\CB83.tmp\CB84.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"121⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f122⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CC5D.tmp\CC5E.tmp\CC5F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"123⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f124⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CD38.tmp\CD39.tmp\CD3A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"125⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f126⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CE13.tmp\CE14.tmp\CE15.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"127⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f128⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CEAF.tmp\CEB0.tmp\CEB1.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"129⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f130⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CF3B.tmp\CF3C.tmp\CF3D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"131⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f132⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CFF7.tmp\D008.tmp\D009.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"133⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f134⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D0C2.tmp\D0C3.tmp\D0C4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"135⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f136⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D1AC.tmp\D1AD.tmp\D1AE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"137⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f138⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D258.tmp\D259.tmp\D25A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"139⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f140⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D304.tmp\D305.tmp\D306.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"141⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f142⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D391.tmp\D3A1.tmp\D3A2.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"143⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f144⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D42D.tmp\D42E.tmp\D42F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"145⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f146⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D508.tmp\D518.tmp\D519.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"147⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f148⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D5A4.tmp\D5A5.tmp\D5A6.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"149⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f150⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D631.tmp\D632.tmp\D633.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"151⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f152⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D70B.tmp\D70C.tmp\D70D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"153⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f154⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D798.tmp\D799.tmp\D79A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"155⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f156⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D844.tmp\D855.tmp\D856.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"157⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f158⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D94E.tmp\D94F.tmp\D950.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"159⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f160⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DA96.tmp\DA97.tmp\DA98.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"161⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f162⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DCA9.tmp\DCAA.tmp\DCAB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"163⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f164⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DE10.tmp\DE11.tmp\DE22.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"165⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f166⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DF1A.tmp\DF1B.tmp\DF1C.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"167⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f168⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E004.tmp\E005.tmp\E006.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"169⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f170⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E11E.tmp\E11F.tmp\FC0A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"171⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f172⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FCF3.tmp\FCF4.tmp\FCF5.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"173⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f174⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FE1B.tmp\FE1C.tmp\FE1D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"175⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f176⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FEF6.tmp\FEF7.tmp\FEF8.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"177⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f178⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FF92.tmp\FF93.tmp\FF94.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"179⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f180⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2F.tmp\30.tmp\31.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"181⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f182⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AC.tmp\BC.tmp\BD.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"183⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f184⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\158.tmp\159.tmp\15A.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"185⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f186⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\242.tmp\243.tmp\244.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"187⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f188⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\2EE.tmp\2EF.tmp\2F0.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"189⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f190⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\36B.tmp\36C.tmp\36D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"191⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f192⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\407.tmp\408.tmp\409.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"193⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f194⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\484.tmp\485.tmp\486.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"195⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f196⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\530.tmp\531.tmp\532.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"197⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f198⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5BD.tmp\5BE.tmp\5BF.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"199⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f200⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\697.tmp\6A8.tmp\6A9.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"201⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f202⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7C0.tmp\7C1.tmp\7C2.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"203⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f204⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8E9.tmp\8EA.tmp\8EB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"205⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f206⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A31.tmp\A42.tmp\A43.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"207⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f208⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B79.tmp\B7A.tmp\B7B.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"209⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f210⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D1F.tmp\D20.tmp\D31.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"211⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f212⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E77.tmp\E78.tmp\E79.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"213⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f214⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FFE.tmp\FFF.tmp\1000.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"215⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f216⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1107.tmp\1108.tmp\1109.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"217⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f218⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\131A.tmp\131B.tmp\131C.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"219⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f220⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1414.tmp\1415.tmp\1426.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"221⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f222⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\154D.tmp\154E.tmp\154F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"223⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f224⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\17AE.tmp\17AF.tmp\17C0.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"225⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f226⤵
- Checks computer location settings
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\18D7.tmp\18D8.tmp\18D9.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"227⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f228⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1A1F.tmp\1A20.tmp\1A21.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"229⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f230⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1B29.tmp\1B2A.tmp\1B2B.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"231⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f232⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1BC5.tmp\1BC6.tmp\1BC7.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"233⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f234⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1C81.tmp\1C82.tmp\1C83.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"235⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f236⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1D1D.tmp\1D1E.tmp\1D1F.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"237⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f238⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1DB9.tmp\1DBA.tmp\1DBB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"239⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exetaskkill /im TasKmgr.exe /f240⤵
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1E55.tmp\1E56.tmp\1E67.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\taskkill.exe /im TasKmgr.exe /f"241⤵