Analysis
-
max time kernel
2s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 01:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
8 signatures
150 seconds
General
-
Target
fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe
-
Size
18KB
-
MD5
fba481af59a2a9a96e61c2db01c0e165
-
SHA1
d40b49ecc10cfccc3679799dd3af42b27c6aecc7
-
SHA256
027274ac962d9b98e743983a84fee81ef37299f32761503993db59df60e8febc
-
SHA512
9df4d0dd3c0c022788f06a3e746523d6d7ef0425896bf82ac1619d936e51656e9a3ffe1f3978234b5d1de7fff9811b86b865fc4fbbb60b1a79e24b4a127f18be
-
SSDEEP
384:I/swepWgn766GhJ5f3/Hu3O+sJ2FA+DIeZU6FieAAJ/5uDakuNVgG6yaSOkZeun7:QswepWg2/n//O3OrUW3E1kepuDakuNVZ
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2704 zscqahlp.exe 7516 zscqahlp.exe 7096 zscqahlp.exe 6740 zscqahlp.exe 6384 zscqahlp.exe 3484 zscqahlp.exe -
Installs/modifies Browser Helper Object 2 TTPs 12 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08}\ = "ypcqghlp.dll" fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08}\ = "ypcqghlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08}\ = "ypcqghlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08}\ = "ypcqghlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08} fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08} zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08} zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08}\ = "ypcqghlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{80AF1289-F140-A140-D012-C1458759FC08}\ = "ypcqghlp.dll" zscqahlp.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File created C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File created C:\Windows\SysWOW64\ypcqghlp.dll fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File created C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File created C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File created C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File created C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\ypcqghlp.dll fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe File created C:\Windows\SysWOW64\zscqahlp.exe fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ypcqghlp.dll zscqahlp.exe File opened for modification C:\Windows\SysWOW64\xscqbhlp.sys zscqahlp.exe File opened for modification C:\Windows\SysWOW64\zscqahlp.exe zscqahlp.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4200 17388 WerFault.exe 716 -
Modifies registry class 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08} fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqghlp.dll" zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqghlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqghlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqghlp.dll" fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32 zscqahlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32 zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqghlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ThreadingModel = "Apartment" fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ = "C:\\Windows\\SysWow64\\ypcqghlp.dll" zscqahlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{80AF1289-F140-A140-D012-C1458759FC08}\InprocServer32\ThreadingModel = "Apartment" zscqahlp.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 2704 zscqahlp.exe 2704 zscqahlp.exe 2704 zscqahlp.exe 2704 zscqahlp.exe 7516 zscqahlp.exe 7516 zscqahlp.exe 7516 zscqahlp.exe 7516 zscqahlp.exe 7096 zscqahlp.exe 7096 zscqahlp.exe 7096 zscqahlp.exe 7096 zscqahlp.exe 6740 zscqahlp.exe 6740 zscqahlp.exe 6740 zscqahlp.exe 6740 zscqahlp.exe 6384 zscqahlp.exe 6384 zscqahlp.exe 6384 zscqahlp.exe 6384 zscqahlp.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Token: SeDebugPrivilege 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe Token: SeDebugPrivilege 2704 zscqahlp.exe Token: SeDebugPrivilege 2704 zscqahlp.exe Token: SeDebugPrivilege 7516 zscqahlp.exe Token: SeDebugPrivilege 7516 zscqahlp.exe Token: SeDebugPrivilege 7096 zscqahlp.exe Token: SeDebugPrivilege 7096 zscqahlp.exe Token: SeDebugPrivilege 6740 zscqahlp.exe Token: SeDebugPrivilege 6740 zscqahlp.exe Token: SeDebugPrivilege 6384 zscqahlp.exe Token: SeDebugPrivilege 6384 zscqahlp.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3540 wrote to memory of 1692 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 88 PID 3540 wrote to memory of 1692 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 88 PID 3540 wrote to memory of 1692 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 88 PID 3540 wrote to memory of 2704 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 90 PID 3540 wrote to memory of 2704 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 90 PID 3540 wrote to memory of 2704 3540 fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe 90 PID 2704 wrote to memory of 4432 2704 zscqahlp.exe 91 PID 2704 wrote to memory of 4432 2704 zscqahlp.exe 91 PID 2704 wrote to memory of 4432 2704 zscqahlp.exe 91 PID 2704 wrote to memory of 7516 2704 zscqahlp.exe 93 PID 2704 wrote to memory of 7516 2704 zscqahlp.exe 93 PID 2704 wrote to memory of 7516 2704 zscqahlp.exe 93 PID 7516 wrote to memory of 7568 7516 zscqahlp.exe 94 PID 7516 wrote to memory of 7568 7516 zscqahlp.exe 94 PID 7516 wrote to memory of 7568 7516 zscqahlp.exe 94 PID 7516 wrote to memory of 7096 7516 zscqahlp.exe 463 PID 7516 wrote to memory of 7096 7516 zscqahlp.exe 463 PID 7516 wrote to memory of 7096 7516 zscqahlp.exe 463 PID 7096 wrote to memory of 4420 7096 zscqahlp.exe 97 PID 7096 wrote to memory of 4420 7096 zscqahlp.exe 97 PID 7096 wrote to memory of 4420 7096 zscqahlp.exe 97 PID 7096 wrote to memory of 6740 7096 zscqahlp.exe 99 PID 7096 wrote to memory of 6740 7096 zscqahlp.exe 99 PID 7096 wrote to memory of 6740 7096 zscqahlp.exe 99 PID 6740 wrote to memory of 6780 6740 zscqahlp.exe 100 PID 6740 wrote to memory of 6780 6740 zscqahlp.exe 100 PID 6740 wrote to memory of 6780 6740 zscqahlp.exe 100 PID 6740 wrote to memory of 6384 6740 zscqahlp.exe 102 PID 6740 wrote to memory of 6384 6740 zscqahlp.exe 102 PID 6740 wrote to memory of 6384 6740 zscqahlp.exe 102 PID 6384 wrote to memory of 6436 6384 zscqahlp.exe 103 PID 6384 wrote to memory of 6436 6384 zscqahlp.exe 103 PID 6384 wrote to memory of 6436 6384 zscqahlp.exe 103 PID 6384 wrote to memory of 3484 6384 zscqahlp.exe 105 PID 6384 wrote to memory of 3484 6384 zscqahlp.exe 105 PID 6384 wrote to memory of 3484 6384 zscqahlp.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fba481af59a2a9a96e61c2db01c0e165_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240601093.bat2⤵PID:1692
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240601484.bat3⤵PID:4432
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240601828.bat4⤵PID:7568
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240602218.bat5⤵PID:4420
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240602625.bat6⤵PID:6780
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603000.bat7⤵PID:6436
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe7⤵
- Executes dropped EXE
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603421.bat8⤵PID:6176
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe8⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603859.bat9⤵PID:1640
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe9⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604250.bat10⤵PID:2836
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe10⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604703.bat11⤵PID:2648
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe11⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605015.bat12⤵PID:1276
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe12⤵PID:9668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605468.bat13⤵PID:9700
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe13⤵PID:8720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606484.bat14⤵PID:8800
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe14⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607046.bat15⤵PID:4904
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe15⤵PID:10072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607375.bat16⤵PID:10100
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe16⤵PID:6704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607656.bat17⤵PID:6684
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe17⤵PID:8256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608109.bat18⤵PID:7772
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe18⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608468.bat19⤵PID:3836
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe19⤵PID:9332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608859.bat20⤵PID:9372
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe20⤵PID:2864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609250.bat21⤵PID:6028
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe21⤵PID:8132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609656.bat22⤵PID:4296
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe22⤵PID:5124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610078.bat23⤵PID:516
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe23⤵PID:5476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610546.bat24⤵PID:5812
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe24⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610937.bat25⤵PID:7936
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe25⤵PID:8076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611375.bat26⤵PID:7780
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe26⤵PID:3068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611750.bat27⤵PID:5888
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe27⤵PID:9268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612078.bat28⤵PID:9860
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe28⤵PID:6456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612500.bat29⤵PID:5848
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe29⤵PID:8056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612859.bat30⤵PID:8644
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe30⤵PID:8464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613359.bat31⤵PID:8396
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe31⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613781.bat32⤵PID:5164
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe32⤵PID:6196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614265.bat33⤵PID:1324
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe33⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614640.bat34⤵PID:10200
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe34⤵PID:6916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615078.bat35⤵PID:8312
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe35⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615515.bat36⤵PID:8976
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe36⤵PID:6848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615921.bat37⤵PID:7996
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe37⤵PID:8988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616343.bat38⤵PID:5332
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe38⤵PID:7732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616796.bat39⤵PID:5372
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe39⤵PID:8652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617187.bat40⤵PID:7932
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe40⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617593.bat41⤵PID:9424
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe41⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618015.bat42⤵PID:9992
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe42⤵PID:9472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618421.bat43⤵PID:7276
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe43⤵PID:7224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618781.bat44⤵PID:9944
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe44⤵PID:6340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619203.bat45⤵PID:6432
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe45⤵PID:6360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619687.bat46⤵PID:4512
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe46⤵PID:6104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619984.bat47⤵PID:2420
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe47⤵PID:9764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620546.bat48⤵PID:7532
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe48⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620921.bat49⤵PID:2476
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe49⤵PID:5704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621421.bat50⤵PID:8556
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe50⤵PID:1344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621781.bat51⤵PID:9144
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe51⤵PID:8568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622312.bat52⤵PID:9620
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe52⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622812.bat53⤵PID:7984
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe53⤵PID:8592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623265.bat54⤵PID:7384
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe54⤵PID:6636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623703.bat55⤵PID:10220
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe55⤵PID:8944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624500.bat56⤵PID:6160
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe56⤵PID:11088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624921.bat57⤵PID:6892
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe57⤵PID:10172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625312.bat58⤵PID:6460
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe58⤵PID:812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625750.bat59⤵PID:2272
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe59⤵PID:9548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626203.bat60⤵PID:10832
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe60⤵PID:11056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626578.bat61⤵PID:10368
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe61⤵PID:8528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627046.bat62⤵PID:3472
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe62⤵PID:10400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627453.bat63⤵PID:5832
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe63⤵PID:7436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627828.bat64⤵PID:8108
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe64⤵PID:7584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628281.bat65⤵PID:8216
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe65⤵PID:12032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628921.bat66⤵PID:12072
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe66⤵PID:5908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629390.bat67⤵PID:3956
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe67⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629781.bat68⤵PID:5340
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe68⤵PID:10732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630203.bat69⤵PID:6836
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe69⤵PID:10460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630640.bat70⤵PID:12260
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe70⤵PID:6700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631031.bat71⤵PID:9280
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe71⤵PID:7052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631437.bat72⤵PID:8400
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe72⤵PID:11576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631765.bat73⤵PID:11612
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe73⤵PID:7600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632171.bat74⤵PID:11676
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe74⤵PID:1748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632546.bat75⤵PID:10116
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe75⤵PID:10228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632890.bat76⤵PID:10596
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe76⤵PID:10188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633218.bat77⤵PID:8104
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe77⤵PID:11856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633625.bat78⤵PID:10760
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe78⤵PID:11820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634156.bat79⤵PID:10848
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe79⤵PID:10612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634609.bat80⤵PID:4552
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe80⤵PID:12364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634906.bat81⤵PID:12416
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe81⤵PID:7500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635343.bat82⤵PID:1764
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe82⤵PID:10856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635765.bat83⤵PID:6560
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe83⤵PID:8428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636156.bat84⤵PID:8068
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe84⤵PID:9904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636671.bat85⤵PID:9180
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe85⤵PID:13016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637109.bat86⤵PID:13048
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe86⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637593.bat87⤵PID:6844
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe87⤵PID:11904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638156.bat88⤵PID:8888
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe88⤵PID:12528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638468.bat89⤵PID:12484
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe89⤵PID:12572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638968.bat90⤵PID:1504
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe90⤵PID:11736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639390.bat91⤵PID:10004
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe91⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639875.bat92⤵PID:9892
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe92⤵PID:9076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640437.bat93⤵PID:12636
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe93⤵PID:10264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640906.bat94⤵PID:9932
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe94⤵PID:13460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641343.bat95⤵PID:13512
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe95⤵PID:11232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641859.bat96⤵PID:13304
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe96⤵PID:12152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642468.bat97⤵PID:11520
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe97⤵PID:12708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642921.bat98⤵PID:7616
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe98⤵PID:12956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643328.bat99⤵PID:11000
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe99⤵PID:5844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643796.bat100⤵PID:14228
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe100⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644359.bat101⤵PID:13328
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe101⤵PID:14104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644937.bat102⤵PID:14096
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe102⤵PID:6420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645250.bat103⤵PID:13112
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe103⤵PID:8160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645781.bat104⤵PID:7096
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe104⤵PID:8536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646281.bat105⤵PID:8076
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe105⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646859.bat106⤵PID:6832
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe106⤵PID:14420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647250.bat107⤵PID:14456
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe107⤵PID:13960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647828.bat108⤵PID:14224
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe108⤵PID:13168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648375.bat109⤵PID:10352
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe109⤵PID:11176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648843.bat110⤵PID:3404
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe110⤵PID:12308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649343.bat111⤵PID:8188
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe111⤵PID:14816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649703.bat112⤵PID:15108
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe112⤵PID:11508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650187.bat113⤵PID:1652
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe113⤵PID:12896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650562.bat114⤵PID:9820
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe114⤵PID:16228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651234.bat115⤵PID:16264
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe115⤵PID:15468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651734.bat116⤵PID:15404
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe116⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652453.bat117⤵PID:12104
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe117⤵PID:14860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652937.bat118⤵PID:7072
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe118⤵PID:16072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653406.bat119⤵PID:16108
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe119⤵PID:15300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653984.bat120⤵PID:1168
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe120⤵PID:14356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654609.bat121⤵PID:8720
-
-
C:\Windows\SysWOW64\zscqahlp.exeC:\Windows\system32\zscqahlp.exe121⤵PID:14772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655062.bat122⤵PID:15072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-