Analysis
-
max time kernel
29s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe
Resource
win10v2004-20240226-en
General
-
Target
4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe
-
Size
115KB
-
MD5
b6d325ff2b6e908e0c52e773fdae61f1
-
SHA1
8584f372d04b748342dd0df4332eaf8a99503b6a
-
SHA256
4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb
-
SHA512
d3be029bf1082b939e8d411841e6fd127b2685d3c327949765ac95dd701974de2a72955cd768264b117732e7df28989b8a9c6ba6220f722a2eefd0886e988692
-
SSDEEP
3072:6tEDHJUqYUOhaDTZSm6H6MKoWOwdFnzyfaD:OUH2qvgiWYdFnzyfaD
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 55 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2256 oEUEYQoQ.exe 1596 CEEQEcEY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oEUEYQoQ.exe = "C:\\Users\\Admin\\BcAIcYwc\\oEUEYQoQ.exe" 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CEEQEcEY.exe = "C:\\ProgramData\\xawMYQcU\\CEEQEcEY.exe" 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\oEUEYQoQ.exe = "C:\\Users\\Admin\\BcAIcYwc\\oEUEYQoQ.exe" oEUEYQoQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CEEQEcEY.exe = "C:\\ProgramData\\xawMYQcU\\CEEQEcEY.exe" CEEQEcEY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4796 reg.exe 3880 reg.exe 464 reg.exe 1284 reg.exe 4304 reg.exe 1136 reg.exe 1216 reg.exe 3796 reg.exe 2540 reg.exe 4964 reg.exe 3776 reg.exe 2644 reg.exe 3896 reg.exe 4596 reg.exe 4620 reg.exe 5016 reg.exe 4512 reg.exe 1372 reg.exe 3832 reg.exe 2088 reg.exe 5064 reg.exe 1628 reg.exe 2548 reg.exe 4324 reg.exe 1712 reg.exe 1828 reg.exe 2440 reg.exe 2732 reg.exe 4192 reg.exe 4256 reg.exe 3156 reg.exe 3092 reg.exe 2328 reg.exe 2632 reg.exe 4740 reg.exe 3672 reg.exe 636 reg.exe 2828 reg.exe 4016 reg.exe 2224 reg.exe 1280 reg.exe 2836 reg.exe 3140 reg.exe 4852 reg.exe 2328 reg.exe 1512 reg.exe 116 reg.exe 4380 reg.exe 3528 reg.exe 3848 reg.exe 692 reg.exe 5064 reg.exe 1136 reg.exe 4928 reg.exe 3336 reg.exe 4600 reg.exe 4440 reg.exe 3640 reg.exe 3564 reg.exe 3132 reg.exe 4848 reg.exe 5004 reg.exe 2168 reg.exe 2828 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1516 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1516 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1516 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1516 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4836 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4836 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4836 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4836 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2440 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2440 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2440 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2440 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1180 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1180 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1180 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1180 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1960 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1960 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1960 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1960 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4848 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4848 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4848 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4848 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2092 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2092 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2092 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 2092 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1640 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1640 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1640 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 1640 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 5068 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 5068 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 5068 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 5068 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 564 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 564 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 564 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 564 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3628 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3628 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3628 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 3628 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 4948 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2256 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 90 PID 3380 wrote to memory of 2256 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 90 PID 3380 wrote to memory of 2256 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 90 PID 3380 wrote to memory of 1596 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 91 PID 3380 wrote to memory of 1596 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 91 PID 3380 wrote to memory of 1596 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 91 PID 3380 wrote to memory of 692 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 92 PID 3380 wrote to memory of 692 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 92 PID 3380 wrote to memory of 692 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 92 PID 3380 wrote to memory of 4776 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 94 PID 3380 wrote to memory of 4776 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 94 PID 3380 wrote to memory of 4776 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 94 PID 3380 wrote to memory of 2304 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 95 PID 3380 wrote to memory of 2304 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 95 PID 3380 wrote to memory of 2304 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 95 PID 3380 wrote to memory of 3176 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 96 PID 3380 wrote to memory of 3176 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 96 PID 3380 wrote to memory of 3176 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 96 PID 3380 wrote to memory of 1544 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 98 PID 3380 wrote to memory of 1544 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 98 PID 3380 wrote to memory of 1544 3380 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 98 PID 1544 wrote to memory of 744 1544 cmd.exe 103 PID 1544 wrote to memory of 744 1544 cmd.exe 103 PID 1544 wrote to memory of 744 1544 cmd.exe 103 PID 692 wrote to memory of 3852 692 cmd.exe 102 PID 692 wrote to memory of 3852 692 cmd.exe 102 PID 692 wrote to memory of 3852 692 cmd.exe 102 PID 3852 wrote to memory of 1612 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 104 PID 3852 wrote to memory of 1612 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 104 PID 3852 wrote to memory of 1612 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 104 PID 1612 wrote to memory of 4696 1612 cmd.exe 106 PID 1612 wrote to memory of 4696 1612 cmd.exe 106 PID 1612 wrote to memory of 4696 1612 cmd.exe 106 PID 3852 wrote to memory of 3476 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 107 PID 3852 wrote to memory of 3476 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 107 PID 3852 wrote to memory of 3476 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 107 PID 3852 wrote to memory of 3528 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 108 PID 3852 wrote to memory of 3528 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 108 PID 3852 wrote to memory of 3528 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 108 PID 3852 wrote to memory of 2828 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 109 PID 3852 wrote to memory of 2828 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 109 PID 3852 wrote to memory of 2828 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 109 PID 3852 wrote to memory of 3480 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 110 PID 3852 wrote to memory of 3480 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 110 PID 3852 wrote to memory of 3480 3852 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 110 PID 3480 wrote to memory of 3556 3480 cmd.exe 115 PID 3480 wrote to memory of 3556 3480 cmd.exe 115 PID 3480 wrote to memory of 3556 3480 cmd.exe 115 PID 4696 wrote to memory of 2152 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 116 PID 4696 wrote to memory of 2152 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 116 PID 4696 wrote to memory of 2152 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 116 PID 2152 wrote to memory of 1516 2152 cmd.exe 118 PID 2152 wrote to memory of 1516 2152 cmd.exe 118 PID 2152 wrote to memory of 1516 2152 cmd.exe 118 PID 4696 wrote to memory of 4748 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 119 PID 4696 wrote to memory of 4748 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 119 PID 4696 wrote to memory of 4748 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 119 PID 4696 wrote to memory of 4652 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 120 PID 4696 wrote to memory of 4652 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 120 PID 4696 wrote to memory of 4652 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 120 PID 4696 wrote to memory of 2812 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 121 PID 4696 wrote to memory of 2812 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 121 PID 4696 wrote to memory of 2812 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 121 PID 4696 wrote to memory of 716 4696 4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe"C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\BcAIcYwc\oEUEYQoQ.exe"C:\Users\Admin\BcAIcYwc\oEUEYQoQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2256
-
-
C:\ProgramData\xawMYQcU\CEEQEcEY.exe"C:\ProgramData\xawMYQcU\CEEQEcEY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"2⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"4⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"6⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"8⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"10⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"12⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"14⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"16⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"18⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"20⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"22⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"24⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"26⤵PID:3128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb27⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"28⤵PID:2936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"30⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"32⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb33⤵PID:1340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"34⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb35⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"36⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb37⤵PID:3712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"38⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb39⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"40⤵PID:3796
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb41⤵PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"42⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb43⤵PID:3872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"44⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb45⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"46⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb47⤵PID:4768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"48⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb49⤵PID:2176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"50⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb51⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"52⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb53⤵PID:716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"54⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb55⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"56⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb57⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"58⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb59⤵PID:2832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"60⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb61⤵PID:1328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"62⤵PID:4776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb63⤵PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"64⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb65⤵PID:2428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"66⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb67⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"68⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb69⤵PID:2548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"70⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb71⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"72⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb73⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"74⤵PID:1320
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb75⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"76⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb77⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"78⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb79⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"80⤵PID:1992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb81⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"82⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb83⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"84⤵PID:2692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb85⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"86⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb87⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"88⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb89⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"90⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb91⤵PID:1340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"92⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb93⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"94⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb95⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"96⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb97⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"98⤵PID:3036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb99⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"100⤵PID:2812
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb101⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"102⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb103⤵PID:3848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"104⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb105⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"106⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb107⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"108⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb109⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"110⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb111⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"112⤵PID:1848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb113⤵PID:2484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"114⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb115⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"116⤵PID:1004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb117⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"118⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb119⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"120⤵PID:808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb.exeC:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb121⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\4fffe8896ff980ce7ebb8836933b14d0ed8f735faeba3bcfe8ad861538b9f4fb"122⤵PID:388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-