Analysis
-
max time kernel
4s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
13b279af1c26c20b78e53df5cde78b73.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13b279af1c26c20b78e53df5cde78b73.exe
Resource
win10v2004-20231215-en
General
-
Target
13b279af1c26c20b78e53df5cde78b73.exe
-
Size
43KB
-
MD5
13b279af1c26c20b78e53df5cde78b73
-
SHA1
4db48d04e5a41a25e47cb09c0a4c2cdd315a1330
-
SHA256
042910348adf112fe022f5e14462014eff7edb21a9afe0a2a79990b046f81dc3
-
SHA512
d139a30b301b64ef299f6735e6289693a8dfcdbb982e0a772b761ff0ca6f352a69854262b779dee8defcf73a65b9818ded8554c3737c04405f1c9cac1e9fac2d
-
SSDEEP
768:mfnqyNnxRcocMo6lyXPLDpUbY+aJcm4hmqHbcqwbLLSc//MYpDfd7lwg:2nfNnxuqotXPPpR4hQXLSGRDFX
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5788 5764 cmd.exe 352 -
Executes dropped EXE 64 IoCs
pid Process 3084 13b279af1c26c20b78e53df5cde78b73.exe 3200 13b279af1c26c20b78e53df5cde78b73.exe 4624 cmd.exe 4452 13b279af1c26c20b78e53df5cde78b73.exe 2268 13b279af1c26c20b78e53df5cde78b73.exe 3308 13b279af1c26c20b78e53df5cde78b73.exe 3068 13b279af1c26c20b78e53df5cde78b73.exe 3260 13b279af1c26c20b78e53df5cde78b73.exe 2488 13b279af1c26c20b78e53df5cde78b73.exe 3004 13b279af1c26c20b78e53df5cde78b73.exe 3044 13b279af1c26c20b78e53df5cde78b73.exe 3000 13b279af1c26c20b78e53df5cde78b73.exe 2072 13b279af1c26c20b78e53df5cde78b73.exe 3224 13b279af1c26c20b78e53df5cde78b73.exe 4696 13b279af1c26c20b78e53df5cde78b73.exe 1624 13b279af1c26c20b78e53df5cde78b73.exe 1344 13b279af1c26c20b78e53df5cde78b73.exe 2860 13b279af1c26c20b78e53df5cde78b73.exe 2364 13b279af1c26c20b78e53df5cde78b73.exe 3804 13b279af1c26c20b78e53df5cde78b73.exe 3624 13b279af1c26c20b78e53df5cde78b73.exe 1364 13b279af1c26c20b78e53df5cde78b73.exe 436 13b279af1c26c20b78e53df5cde78b73.exe 4440 13b279af1c26c20b78e53df5cde78b73.exe 4360 13b279af1c26c20b78e53df5cde78b73.exe 668 13b279af1c26c20b78e53df5cde78b73.exe 2248 13b279af1c26c20b78e53df5cde78b73.exe 556 13b279af1c26c20b78e53df5cde78b73.exe 1916 cmd.exe 2792 13b279af1c26c20b78e53df5cde78b73.exe 4908 13b279af1c26c20b78e53df5cde78b73.exe 1612 cmd.exe 3324 cmd.exe 4832 13b279af1c26c20b78e53df5cde78b73.exe 1148 13b279af1c26c20b78e53df5cde78b73.exe 1012 13b279af1c26c20b78e53df5cde78b73.exe 3308 13b279af1c26c20b78e53df5cde78b73.exe 4664 13b279af1c26c20b78e53df5cde78b73.exe 2444 13b279af1c26c20b78e53df5cde78b73.exe 5064 cmd.exe 540 13b279af1c26c20b78e53df5cde78b73.exe 5080 13b279af1c26c20b78e53df5cde78b73.exe 4020 13b279af1c26c20b78e53df5cde78b73.exe 8 cmd.exe 4188 cmd.exe 3736 13b279af1c26c20b78e53df5cde78b73.exe 1344 13b279af1c26c20b78e53df5cde78b73.exe 2860 13b279af1c26c20b78e53df5cde78b73.exe 3516 13b279af1c26c20b78e53df5cde78b73.exe 1528 cmd.exe 1616 13b279af1c26c20b78e53df5cde78b73.exe 4356 13b279af1c26c20b78e53df5cde78b73.exe 1076 13b279af1c26c20b78e53df5cde78b73.exe 2692 13b279af1c26c20b78e53df5cde78b73.exe 3988 13b279af1c26c20b78e53df5cde78b73.exe 1940 13b279af1c26c20b78e53df5cde78b73.exe 1540 13b279af1c26c20b78e53df5cde78b73.exe 4336 13b279af1c26c20b78e53df5cde78b73.exe 1360 13b279af1c26c20b78e53df5cde78b73.exe 3240 13b279af1c26c20b78e53df5cde78b73.exe 1892 13b279af1c26c20b78e53df5cde78b73.exe 1652 13b279af1c26c20b78e53df5cde78b73.exe 2096 13b279af1c26c20b78e53df5cde78b73.exe 3260 13b279af1c26c20b78e53df5cde78b73.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe Process not Found File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe cmd.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe File created C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exe 13b279af1c26c20b78e53df5cde78b73.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1612 cmd.exe Token: SeIncBasePriorityPrivilege 3084 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3200 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4624 cmd.exe Token: SeIncBasePriorityPrivilege 4452 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2268 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3308 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3068 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3260 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2488 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3004 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3044 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3000 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2072 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3224 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4696 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1624 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1344 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2860 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2364 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3804 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3624 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1364 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 436 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4440 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4360 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 668 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2248 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 556 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1916 cmd.exe Token: SeIncBasePriorityPrivilege 2792 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4908 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1612 cmd.exe Token: SeIncBasePriorityPrivilege 3324 cmd.exe Token: SeIncBasePriorityPrivilege 4832 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1148 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1012 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3308 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4664 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2444 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 5064 cmd.exe Token: SeIncBasePriorityPrivilege 540 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 5080 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4020 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 8 cmd.exe Token: SeIncBasePriorityPrivilege 4188 cmd.exe Token: SeIncBasePriorityPrivilege 3736 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1344 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2860 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3516 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1528 cmd.exe Token: SeIncBasePriorityPrivilege 1616 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4356 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1076 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2692 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3988 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1940 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1540 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 4336 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1360 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 3240 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1892 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 1652 13b279af1c26c20b78e53df5cde78b73.exe Token: SeIncBasePriorityPrivilege 2096 13b279af1c26c20b78e53df5cde78b73.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1612 13b279af1c26c20b78e53df5cde78b73.exe 1612 13b279af1c26c20b78e53df5cde78b73.exe 3084 13b279af1c26c20b78e53df5cde78b73.exe 3084 13b279af1c26c20b78e53df5cde78b73.exe 3200 13b279af1c26c20b78e53df5cde78b73.exe 3200 13b279af1c26c20b78e53df5cde78b73.exe 4624 cmd.exe 4624 cmd.exe 4452 13b279af1c26c20b78e53df5cde78b73.exe 4452 13b279af1c26c20b78e53df5cde78b73.exe 2268 13b279af1c26c20b78e53df5cde78b73.exe 2268 13b279af1c26c20b78e53df5cde78b73.exe 3308 13b279af1c26c20b78e53df5cde78b73.exe 3308 13b279af1c26c20b78e53df5cde78b73.exe 3068 13b279af1c26c20b78e53df5cde78b73.exe 3068 13b279af1c26c20b78e53df5cde78b73.exe 3260 13b279af1c26c20b78e53df5cde78b73.exe 3260 13b279af1c26c20b78e53df5cde78b73.exe 2488 13b279af1c26c20b78e53df5cde78b73.exe 2488 13b279af1c26c20b78e53df5cde78b73.exe 3004 13b279af1c26c20b78e53df5cde78b73.exe 3004 13b279af1c26c20b78e53df5cde78b73.exe 3044 13b279af1c26c20b78e53df5cde78b73.exe 3044 13b279af1c26c20b78e53df5cde78b73.exe 3000 13b279af1c26c20b78e53df5cde78b73.exe 3000 13b279af1c26c20b78e53df5cde78b73.exe 2072 13b279af1c26c20b78e53df5cde78b73.exe 2072 13b279af1c26c20b78e53df5cde78b73.exe 3224 13b279af1c26c20b78e53df5cde78b73.exe 3224 13b279af1c26c20b78e53df5cde78b73.exe 4696 13b279af1c26c20b78e53df5cde78b73.exe 4696 13b279af1c26c20b78e53df5cde78b73.exe 1624 13b279af1c26c20b78e53df5cde78b73.exe 1624 13b279af1c26c20b78e53df5cde78b73.exe 1344 13b279af1c26c20b78e53df5cde78b73.exe 1344 13b279af1c26c20b78e53df5cde78b73.exe 2860 13b279af1c26c20b78e53df5cde78b73.exe 2860 13b279af1c26c20b78e53df5cde78b73.exe 2364 13b279af1c26c20b78e53df5cde78b73.exe 2364 13b279af1c26c20b78e53df5cde78b73.exe 3804 13b279af1c26c20b78e53df5cde78b73.exe 3804 13b279af1c26c20b78e53df5cde78b73.exe 3624 13b279af1c26c20b78e53df5cde78b73.exe 3624 13b279af1c26c20b78e53df5cde78b73.exe 1364 13b279af1c26c20b78e53df5cde78b73.exe 1364 13b279af1c26c20b78e53df5cde78b73.exe 436 13b279af1c26c20b78e53df5cde78b73.exe 436 13b279af1c26c20b78e53df5cde78b73.exe 4440 13b279af1c26c20b78e53df5cde78b73.exe 4440 13b279af1c26c20b78e53df5cde78b73.exe 4360 13b279af1c26c20b78e53df5cde78b73.exe 4360 13b279af1c26c20b78e53df5cde78b73.exe 668 13b279af1c26c20b78e53df5cde78b73.exe 668 13b279af1c26c20b78e53df5cde78b73.exe 2248 13b279af1c26c20b78e53df5cde78b73.exe 2248 13b279af1c26c20b78e53df5cde78b73.exe 556 13b279af1c26c20b78e53df5cde78b73.exe 556 13b279af1c26c20b78e53df5cde78b73.exe 1916 cmd.exe 1916 cmd.exe 2792 13b279af1c26c20b78e53df5cde78b73.exe 2792 13b279af1c26c20b78e53df5cde78b73.exe 4908 13b279af1c26c20b78e53df5cde78b73.exe 4908 13b279af1c26c20b78e53df5cde78b73.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3084 1612 13b279af1c26c20b78e53df5cde78b73.exe 89 PID 1612 wrote to memory of 3084 1612 13b279af1c26c20b78e53df5cde78b73.exe 89 PID 1612 wrote to memory of 3084 1612 13b279af1c26c20b78e53df5cde78b73.exe 89 PID 1612 wrote to memory of 2128 1612 cmd.exe 90 PID 1612 wrote to memory of 2128 1612 cmd.exe 90 PID 1612 wrote to memory of 2128 1612 cmd.exe 90 PID 3084 wrote to memory of 3200 3084 13b279af1c26c20b78e53df5cde78b73.exe 149 PID 3084 wrote to memory of 3200 3084 13b279af1c26c20b78e53df5cde78b73.exe 149 PID 3084 wrote to memory of 3200 3084 13b279af1c26c20b78e53df5cde78b73.exe 149 PID 3084 wrote to memory of 3212 3084 13b279af1c26c20b78e53df5cde78b73.exe 547 PID 3084 wrote to memory of 3212 3084 13b279af1c26c20b78e53df5cde78b73.exe 547 PID 3084 wrote to memory of 3212 3084 13b279af1c26c20b78e53df5cde78b73.exe 547 PID 3200 wrote to memory of 4624 3200 13b279af1c26c20b78e53df5cde78b73.exe 273 PID 3200 wrote to memory of 4624 3200 13b279af1c26c20b78e53df5cde78b73.exe 273 PID 3200 wrote to memory of 4624 3200 13b279af1c26c20b78e53df5cde78b73.exe 273 PID 3200 wrote to memory of 3188 3200 13b279af1c26c20b78e53df5cde78b73.exe 657 PID 3200 wrote to memory of 3188 3200 13b279af1c26c20b78e53df5cde78b73.exe 657 PID 3200 wrote to memory of 3188 3200 13b279af1c26c20b78e53df5cde78b73.exe 657 PID 4624 wrote to memory of 4452 4624 cmd.exe 656 PID 4624 wrote to memory of 4452 4624 cmd.exe 656 PID 4624 wrote to memory of 4452 4624 cmd.exe 656 PID 4624 wrote to memory of 1240 4624 cmd.exe 655 PID 4624 wrote to memory of 1240 4624 cmd.exe 655 PID 4624 wrote to memory of 1240 4624 cmd.exe 655 PID 4452 wrote to memory of 2268 4452 13b279af1c26c20b78e53df5cde78b73.exe 654 PID 4452 wrote to memory of 2268 4452 13b279af1c26c20b78e53df5cde78b73.exe 654 PID 4452 wrote to memory of 2268 4452 13b279af1c26c20b78e53df5cde78b73.exe 654 PID 4452 wrote to memory of 1512 4452 13b279af1c26c20b78e53df5cde78b73.exe 653 PID 4452 wrote to memory of 1512 4452 13b279af1c26c20b78e53df5cde78b73.exe 653 PID 4452 wrote to memory of 1512 4452 13b279af1c26c20b78e53df5cde78b73.exe 653 PID 2268 wrote to memory of 3308 2268 13b279af1c26c20b78e53df5cde78b73.exe 652 PID 2268 wrote to memory of 3308 2268 13b279af1c26c20b78e53df5cde78b73.exe 652 PID 2268 wrote to memory of 3308 2268 13b279af1c26c20b78e53df5cde78b73.exe 652 PID 2268 wrote to memory of 1896 2268 13b279af1c26c20b78e53df5cde78b73.exe 651 PID 2268 wrote to memory of 1896 2268 13b279af1c26c20b78e53df5cde78b73.exe 651 PID 2268 wrote to memory of 1896 2268 13b279af1c26c20b78e53df5cde78b73.exe 651 PID 3308 wrote to memory of 3068 3308 13b279af1c26c20b78e53df5cde78b73.exe 650 PID 3308 wrote to memory of 3068 3308 13b279af1c26c20b78e53df5cde78b73.exe 650 PID 3308 wrote to memory of 3068 3308 13b279af1c26c20b78e53df5cde78b73.exe 650 PID 3308 wrote to memory of 4304 3308 13b279af1c26c20b78e53df5cde78b73.exe 649 PID 3308 wrote to memory of 4304 3308 13b279af1c26c20b78e53df5cde78b73.exe 649 PID 3308 wrote to memory of 4304 3308 13b279af1c26c20b78e53df5cde78b73.exe 649 PID 3068 wrote to memory of 3260 3068 13b279af1c26c20b78e53df5cde78b73.exe 648 PID 3068 wrote to memory of 3260 3068 13b279af1c26c20b78e53df5cde78b73.exe 648 PID 3068 wrote to memory of 3260 3068 13b279af1c26c20b78e53df5cde78b73.exe 648 PID 3068 wrote to memory of 4984 3068 13b279af1c26c20b78e53df5cde78b73.exe 647 PID 3068 wrote to memory of 4984 3068 13b279af1c26c20b78e53df5cde78b73.exe 647 PID 3068 wrote to memory of 4984 3068 13b279af1c26c20b78e53df5cde78b73.exe 647 PID 3260 wrote to memory of 2488 3260 13b279af1c26c20b78e53df5cde78b73.exe 646 PID 3260 wrote to memory of 2488 3260 13b279af1c26c20b78e53df5cde78b73.exe 646 PID 3260 wrote to memory of 2488 3260 13b279af1c26c20b78e53df5cde78b73.exe 646 PID 3260 wrote to memory of 2004 3260 13b279af1c26c20b78e53df5cde78b73.exe 644 PID 3260 wrote to memory of 2004 3260 13b279af1c26c20b78e53df5cde78b73.exe 644 PID 3260 wrote to memory of 2004 3260 13b279af1c26c20b78e53df5cde78b73.exe 644 PID 2488 wrote to memory of 3004 2488 13b279af1c26c20b78e53df5cde78b73.exe 643 PID 2488 wrote to memory of 3004 2488 13b279af1c26c20b78e53df5cde78b73.exe 643 PID 2488 wrote to memory of 3004 2488 13b279af1c26c20b78e53df5cde78b73.exe 643 PID 2488 wrote to memory of 5064 2488 13b279af1c26c20b78e53df5cde78b73.exe 642 PID 2488 wrote to memory of 5064 2488 13b279af1c26c20b78e53df5cde78b73.exe 642 PID 2488 wrote to memory of 5064 2488 13b279af1c26c20b78e53df5cde78b73.exe 642 PID 3004 wrote to memory of 3044 3004 13b279af1c26c20b78e53df5cde78b73.exe 641 PID 3004 wrote to memory of 3044 3004 13b279af1c26c20b78e53df5cde78b73.exe 641 PID 3004 wrote to memory of 3044 3004 13b279af1c26c20b78e53df5cde78b73.exe 641 PID 3004 wrote to memory of 1456 3004 13b279af1c26c20b78e53df5cde78b73.exe 640
Processes
-
C:\Users\Admin\AppData\Local\Temp\13b279af1c26c20b78e53df5cde78b73.exe"C:\Users\Admin\AppData\Local\Temp\13b279af1c26c20b78e53df5cde78b73.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3200
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\13B279~1.EXE > nul2⤵PID:2128
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:3824
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4736
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:2708
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1916
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1612
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul1⤵PID:1656
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4856
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4304
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4636
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5064
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:8
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:3100
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:1528
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1076
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5372
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:2568
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:3464
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:1680
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:6108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul9⤵PID:4904
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3224
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:3028
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5440
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5400
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4540
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul1⤵PID:880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4480
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3124
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5028
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Drops file in System32 directory
PID:1868
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:2668
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3284
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5076
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3984
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3052
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3800
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1312
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:828
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:4848
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1444
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5044
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:2000
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1356
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:2668
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:2640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:2548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:4448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:2640
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:1044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5060
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:2208
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:1400
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:940
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:2140
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:864
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Drops file in System32 directory
PID:1392
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1656
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:640
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul1⤵PID:4936
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:4648
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4796
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:692
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:2788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:3340
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:3820
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4696
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:4516
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:1892
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Drops file in System32 directory
PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:1780
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3472
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3208
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:1864
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:3240
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:3304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:3160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:3088
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵
- Drops file in System32 directory
PID:4612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:3188
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:4896
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul1⤵PID:2320
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:2640
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3212
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1316
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:3300
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:2596
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:396
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3240
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4044
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3304
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:1312
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:2208
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:1456
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:1316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:3768
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul9⤵PID:4708
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:2360
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:1360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:2588
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:4492
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:3760
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:4800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:4252
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3528
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3876
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:4188
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:2840
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3592
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Drops file in System32 directory
PID:1312 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3488
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:4848
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:3184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:1160
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:3868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:2428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:3748
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:1560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:2156
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Drops file in System32 directory
PID:664
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:2640
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:3088
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4984
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵
- Drops file in System32 directory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:2704
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵
- Drops file in System32 directory
PID:4340
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:1684
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:988
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:3736
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:1152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵
- Drops file in System32 directory
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:4892
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵
- Drops file in System32 directory
PID:1400
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4440
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:2152
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:3588
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:1344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3592
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵
- Drops file in System32 directory
PID:4796 -
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:624
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3440
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5080
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:3000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5176
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:5144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:3940
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2072
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:5196
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:2640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5044
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:3644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:3296
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:2548
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:1356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵
- Drops file in System32 directory
PID:3284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:4032
-
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:2976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:3824
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:3472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:4180
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵
- Drops file in System32 directory
PID:3704
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5236
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5276
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5384
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5304
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5396
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5508
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul1⤵PID:5424
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5520
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5560
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5604
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5644
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:5684
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:5728
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5768
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵PID:5808
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe9⤵PID:5848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul10⤵PID:5916
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe10⤵PID:5888
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5756
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:5456
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:5912
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5888
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵PID:5952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul9⤵PID:6052
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5976
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:6068
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:6032
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:4984
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3260
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5672
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5632
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5592
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5928
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5968
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:6012
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:6052
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:6092
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:6132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:4840
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:5272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:5132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:3760
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:6120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:6080
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5404
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5376
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5372
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5528
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:1680
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5524
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5660
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5764
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5864
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5984
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5872
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:6088
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5972
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:6024
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:6076
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:6116
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5212
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:5232
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:5292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5408
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:5500
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:5328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:5692
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5356
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:6132
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1544
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:3116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5652
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5576
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:3112
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5716
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5324
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:1752
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5152
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5620
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5680
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5688
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:1076
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:1680
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:2224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:3820
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5464
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:2692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5824
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:3556
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:5620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5804
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:6020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:1300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:4344
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5648
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5220
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4284
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5256
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5376
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5852
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul9⤵PID:3856
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:5612
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:2348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:5444
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:5252
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:6140
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:6072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:4448
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:6040
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:1624
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5196
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5476
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:2692
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:5016
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:5688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul8⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul9⤵PID:4824
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul7⤵PID:5876
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5160
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:5548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:5776
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5248
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5208
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:6024
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5380
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:1476
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5300
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:1624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:4848
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:6112
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5600
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul2⤵PID:548
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:5680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul3⤵PID:5768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5836
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:5820
-
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe1⤵PID:5668
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe2⤵PID:4384
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe3⤵PID:5688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:6100
-
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:5464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul5⤵PID:6032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul6⤵PID:5952
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:6108
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\13B279~1.EXE > nul4⤵PID:6060
-
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe4⤵PID:2224
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe5⤵PID:1916
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe6⤵PID:4528
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe7⤵PID:1680
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe8⤵PID:2972
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe9⤵PID:528
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe10⤵PID:1600
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe11⤵PID:2224
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe12⤵PID:6184
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe13⤵PID:6224
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe14⤵PID:6264
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe15⤵PID:6304
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe16⤵PID:6344
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe17⤵PID:6384
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe18⤵PID:6436
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe19⤵PID:6488
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe20⤵PID:6528
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe21⤵PID:6572
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe22⤵PID:6620
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe23⤵PID:6668
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe24⤵PID:6708
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe25⤵PID:6764
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe26⤵PID:6804
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe27⤵PID:6852
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe28⤵PID:6892
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe29⤵PID:6944
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe30⤵PID:7000
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe31⤵PID:7040
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe32⤵PID:7088
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe33⤵PID:7128
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe34⤵PID:5868
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe35⤵PID:6192
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe36⤵PID:6260
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe37⤵PID:6236
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe38⤵PID:6352
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe39⤵PID:6400
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe40⤵PID:6344
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe41⤵PID:3108
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe42⤵PID:5024
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe43⤵PID:6544
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe44⤵PID:3472
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe45⤵PID:6556
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe46⤵PID:6580
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe47⤵PID:2948
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe48⤵PID:6668
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe49⤵PID:6848
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe50⤵PID:6836
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe51⤵PID:6952
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe52⤵PID:6956
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe53⤵PID:7044
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe54⤵PID:7140
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe55⤵PID:6148
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe56⤵PID:2376
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe57⤵PID:6352
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe58⤵PID:4552
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe59⤵PID:772
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe60⤵PID:3628
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe61⤵PID:6616
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe62⤵PID:6628
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe63⤵PID:6800
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe64⤵PID:6712
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe65⤵PID:2144
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe66⤵PID:6888
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe67⤵PID:6952
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe68⤵PID:1600
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe69⤵PID:7128
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe70⤵PID:6244
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe71⤵PID:1528
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe72⤵PID:6344
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe73⤵PID:6592
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe74⤵PID:6580
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe75⤵PID:6528
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe76⤵PID:6764
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe77⤵PID:6872
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe78⤵PID:6888
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe79⤵PID:6224
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe80⤵PID:7140
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe81⤵PID:6244
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe82⤵PID:4552
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe83⤵PID:6628
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe84⤵PID:6580
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe85⤵PID:7008
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe86⤵PID:7012
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe87⤵PID:5680
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe88⤵PID:7104
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe89⤵PID:6524
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe90⤵PID:6724
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe91⤵PID:2772
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe92⤵PID:6572
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe93⤵PID:2144
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe94⤵PID:2128
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe95⤵PID:6224
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe96⤵PID:6504
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe97⤵PID:1744
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe98⤵PID:7008
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe99⤵PID:2144
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe100⤵PID:6544
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe101⤵PID:2772
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe102⤵PID:2032
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe103⤵PID:6448
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe104⤵PID:4920
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe105⤵PID:6544
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe106⤵PID:5432
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe107⤵PID:1340
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe108⤵PID:1744
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe109⤵PID:6448
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe110⤵PID:3000
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe111⤵PID:2144
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe112⤵PID:4920
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe113⤵PID:988
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe114⤵PID:2576
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe115⤵PID:6500
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe116⤵PID:6948
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe117⤵PID:7196
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe118⤵PID:7236
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe119⤵PID:7280
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe120⤵PID:7320
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe121⤵PID:7360
-
C:\Windows\SysWOW64\13b279af1c26c20b78e53df5cde78b73.exeC:\Windows\system32\13b279af1c26c20b78e53df5cde78b73.exe122⤵PID:7400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-