Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe
Resource
win10v2004-20240426-en
General
-
Target
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe
-
Size
207KB
-
MD5
17b82e64e80caab520aac1965ba4f8cb
-
SHA1
2e4a23c270b3e8d9324a7192f07f405ef03bea59
-
SHA256
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784
-
SHA512
e882a59ea0feaa556a303e7857f04f1415216509658ed5888c2e61b4de5f136e4cfe4f09e8e54ecee42abadec53431520aa3646401df400e87f2cace67eab3a7
-
SSDEEP
3072:+xeV4f7Gdz24bTZ6OoaqGGY6wzOKbghx0O8CLLpK6LC0Pybl:KeVwQiq9epwR0b5K67P4l
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CAAwgIcw.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation CAAwgIcw.exe -
Executes dropped EXE 2 IoCs
Processes:
CAAwgIcw.exeawooQcIY.exepid process 2816 CAAwgIcw.exe 2948 awooQcIY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeCAAwgIcw.exeawooQcIY.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CmIUIwwM.exe = "C:\\Users\\Admin\\EYUoQsEs\\CmIUIwwM.exe" a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JIUwMcog.exe = "C:\\ProgramData\\ioYYEkoI\\JIUwMcog.exe" a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CAAwgIcw.exe = "C:\\Users\\Admin\\FMcEIoYo\\CAAwgIcw.exe" a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\awooQcIY.exe = "C:\\ProgramData\\BGMEcwkU\\awooQcIY.exe" a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CAAwgIcw.exe = "C:\\Users\\Admin\\FMcEIoYo\\CAAwgIcw.exe" CAAwgIcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\awooQcIY.exe = "C:\\ProgramData\\BGMEcwkU\\awooQcIY.exe" awooQcIY.exe -
Drops file in System32 directory 2 IoCs
Processes:
CAAwgIcw.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe CAAwgIcw.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe CAAwgIcw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1424 4216 WerFault.exe JIUwMcog.exe 4328 3188 WerFault.exe CmIUIwwM.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 4020 reg.exe 1616 1512 3892 536 reg.exe 1420 reg.exe 1512 reg.exe 2984 reg.exe 1524 reg.exe 2932 reg.exe 3916 4880 reg.exe 4284 reg.exe 2720 reg.exe 4216 reg.exe 2792 2320 reg.exe 3920 reg.exe 1864 4140 reg.exe 444 reg.exe 1976 reg.exe 2312 reg.exe 716 reg.exe 2472 reg.exe 2280 reg.exe 4068 reg.exe 852 reg.exe 2160 reg.exe 4480 reg.exe 4232 1716 2040 reg.exe 2040 1904 3356 reg.exe 4324 reg.exe 4616 1272 reg.exe 1272 reg.exe 1212 reg.exe 3748 reg.exe 2824 reg.exe 3944 reg.exe 1600 reg.exe 1540 64 reg.exe 4280 reg.exe 2392 reg.exe 740 reg.exe 4284 5108 reg.exe 2060 reg.exe 2312 reg.exe 8 reg.exe 3352 reg.exe 4132 reg.exe 3196 reg.exe 4860 reg.exe 3664 reg.exe 4860 4880 reg.exe 2984 reg.exe 1544 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exepid process 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 3788 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 3788 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 3788 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 3788 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2560 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2560 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2560 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2560 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1592 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1592 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1592 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1592 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2148 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2148 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2148 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 2148 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1464 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1464 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1464 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1464 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1056 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1056 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1056 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1056 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4684 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1876 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1876 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1876 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1876 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1524 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1524 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1524 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 1524 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4944 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4944 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4944 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4944 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4564 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4564 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4564 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4564 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4352 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4352 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4352 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe 4352 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
CAAwgIcw.exepid process 2816 CAAwgIcw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
CAAwgIcw.exepid process 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe 2816 CAAwgIcw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.execmd.execmd.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.execmd.execmd.exea376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.execmd.exedescription pid process target process PID 2536 wrote to memory of 2816 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe CAAwgIcw.exe PID 2536 wrote to memory of 2816 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe CAAwgIcw.exe PID 2536 wrote to memory of 2816 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe CAAwgIcw.exe PID 2536 wrote to memory of 2948 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe awooQcIY.exe PID 2536 wrote to memory of 2948 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe awooQcIY.exe PID 2536 wrote to memory of 2948 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe awooQcIY.exe PID 2536 wrote to memory of 3824 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2536 wrote to memory of 3824 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2536 wrote to memory of 3824 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 3824 wrote to memory of 2096 3824 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe PID 3824 wrote to memory of 2096 3824 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe PID 3824 wrote to memory of 2096 3824 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe PID 2536 wrote to memory of 4636 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 4636 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 4636 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 4396 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 4396 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 4396 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 2300 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 2300 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 2300 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2536 wrote to memory of 372 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2536 wrote to memory of 372 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2536 wrote to memory of 372 2536 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 372 wrote to memory of 2268 372 cmd.exe cscript.exe PID 372 wrote to memory of 2268 372 cmd.exe cscript.exe PID 372 wrote to memory of 2268 372 cmd.exe cscript.exe PID 2096 wrote to memory of 3904 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2096 wrote to memory of 3904 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2096 wrote to memory of 3904 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 3904 wrote to memory of 4420 3904 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe PID 3904 wrote to memory of 4420 3904 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe PID 3904 wrote to memory of 4420 3904 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe PID 2096 wrote to memory of 2280 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 2280 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 2280 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 400 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 400 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 400 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 4940 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 4940 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 4940 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 2096 wrote to memory of 3656 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2096 wrote to memory of 3656 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 2096 wrote to memory of 3656 2096 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 3656 wrote to memory of 4436 3656 cmd.exe cscript.exe PID 3656 wrote to memory of 4436 3656 cmd.exe cscript.exe PID 3656 wrote to memory of 4436 3656 cmd.exe cscript.exe PID 4420 wrote to memory of 4236 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 4420 wrote to memory of 4236 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 4420 wrote to memory of 4236 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 4420 wrote to memory of 4616 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 4616 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 4616 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 2920 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 2920 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 2920 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 3148 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 3148 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 3148 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe reg.exe PID 4420 wrote to memory of 2972 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 4420 wrote to memory of 2972 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 4420 wrote to memory of 2972 4420 a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe cmd.exe PID 4236 wrote to memory of 3788 4236 cmd.exe a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe"C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\FMcEIoYo\CAAwgIcw.exe"C:\Users\Admin\FMcEIoYo\CAAwgIcw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2816 -
C:\ProgramData\BGMEcwkU\awooQcIY.exe"C:\ProgramData\BGMEcwkU\awooQcIY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"2⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc297843⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"4⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc297845⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"6⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc297847⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"8⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc297849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"10⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978411⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"12⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978413⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"14⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978415⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"16⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978417⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"18⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978419⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"20⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978421⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"22⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978423⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"24⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978425⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"26⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978427⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"28⤵PID:4284
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978429⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"30⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978431⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"32⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978433⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"34⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978435⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"36⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978437⤵PID:1208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"38⤵PID:1552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978439⤵PID:612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"40⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978441⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"42⤵PID:4640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978443⤵PID:3040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"44⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978445⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"46⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978447⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"48⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978449⤵PID:900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"50⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978451⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"52⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978453⤵PID:916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"54⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978455⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"56⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978457⤵PID:2392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"58⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978459⤵
- Adds Run key to start application
PID:2072 -
C:\Users\Admin\EYUoQsEs\CmIUIwwM.exe"C:\Users\Admin\EYUoQsEs\CmIUIwwM.exe"60⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 22461⤵
- Program crash
PID:4328 -
C:\ProgramData\ioYYEkoI\JIUwMcog.exe"C:\ProgramData\ioYYEkoI\JIUwMcog.exe"60⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 22461⤵
- Program crash
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"60⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978461⤵PID:1876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"62⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978463⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"64⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978465⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"66⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978467⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"68⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978469⤵PID:1052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"70⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978471⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"72⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978473⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"74⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978475⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"76⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978477⤵PID:1396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"78⤵PID:1920
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978479⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"80⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978481⤵PID:2756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"82⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978483⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"84⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978485⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"86⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978487⤵PID:612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"88⤵PID:4616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978489⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"90⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978491⤵PID:728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"92⤵PID:4280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978493⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"94⤵PID:4488
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978495⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"96⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978497⤵PID:724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"98⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc2978499⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"100⤵PID:3240
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784101⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"102⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784103⤵PID:656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"104⤵PID:4076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784105⤵PID:3840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"106⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784107⤵PID:1376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"108⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784109⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"110⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784111⤵PID:772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"112⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784113⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"114⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784115⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"116⤵PID:3828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784117⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"118⤵PID:4288
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784119⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"120⤵PID:4852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784121⤵PID:4008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"122⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784123⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"124⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784125⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"126⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784127⤵PID:2996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"128⤵PID:1512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1129⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784129⤵PID:3852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"130⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784131⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"132⤵PID:4360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1133⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784133⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"134⤵PID:2392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1135⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784135⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"136⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784137⤵PID:64
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"138⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784139⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"140⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784141⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"142⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784143⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"144⤵PID:1752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1145⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784145⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"146⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784147⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"148⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784149⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"150⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784151⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"152⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784153⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"154⤵PID:4932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1155⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784155⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"156⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784157⤵PID:1688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"158⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784159⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"160⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784161⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"162⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784163⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"164⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784165⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"166⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784167⤵PID:3936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"168⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784169⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"170⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784171⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"172⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784173⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"174⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784175⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"176⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784177⤵PID:1344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"178⤵PID:4684
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784179⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"180⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784181⤵PID:728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"182⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784183⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"184⤵PID:2144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1185⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784185⤵PID:716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"186⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784187⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"188⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784189⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"190⤵PID:4088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784191⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"192⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784193⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"194⤵PID:4360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1195⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784195⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"196⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784197⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"198⤵PID:4544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784199⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"200⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784201⤵PID:1092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"202⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784203⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"204⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784205⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"206⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784207⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"208⤵PID:2932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1209⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784209⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"210⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784211⤵PID:2892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"212⤵PID:2080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1213⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784213⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"214⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784215⤵PID:2304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"216⤵PID:656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1217⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784217⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"218⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784219⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"220⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784221⤵PID:724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"222⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784223⤵PID:536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"224⤵PID:2996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1225⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784225⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"226⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784227⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"228⤵PID:1976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1229⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784229⤵PID:548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"230⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784231⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"232⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784233⤵PID:464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"234⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784235⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"236⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784237⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"238⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784239⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"240⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784.exeC:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784241⤵PID:1532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\a376ad480944f8a6e3dd1fe3a260a9d6196b88010a91e1af0883d2f44bc29784"242⤵PID:544