Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
343s -
max time network
369s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 20:19
Static task
static1
Behavioral task
behavioral1
Sample
Echo test.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Echo test.exe
-
Size
3.8MB
-
MD5
a6055484fbf56a8cfe6a8ce1ad5fe91c
-
SHA1
5e159ecd3265c619dcaae0dbdfaa71fa0533c6f6
-
SHA256
7a2e63f7601af70c3660110cd7d0967d909b2c5ad2ab3bdf834c85d900fe5c94
-
SHA512
6f0dc67e4c14b34cc000e3ad1886f4586d02bba55f5ae8f7ae46eb7269f9603b9120ffe7053fc2cfd91ee3f2f6eb250a47e6cad53e73cbe9e637cfc6f9f847f7
-
SSDEEP
98304:yTApDs2KOw0axITDx00qlvqZpXSfU7dFDSfJtMKSGM:Cp2Kf0ZTDx0z88fUdEIKSGM
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Echo test.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ChainComponentBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 2280 ChainComponentBroker.exe 2276 explorer.exe 3816 DesktopBoom.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\spoolsv.exe ChainComponentBroker.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\f3b6ecef712a24 ChainComponentBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Echo test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings ChainComponentBroker.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings Echo test.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe 2280 ChainComponentBroker.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2276 explorer.exe 3816 DesktopBoom.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2280 ChainComponentBroker.exe Token: SeDebugPrivilege 2276 explorer.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3352 wrote to memory of 2396 3352 Echo test.exe 82 PID 3352 wrote to memory of 2396 3352 Echo test.exe 82 PID 3352 wrote to memory of 2396 3352 Echo test.exe 82 PID 2396 wrote to memory of 1048 2396 WScript.exe 88 PID 2396 wrote to memory of 1048 2396 WScript.exe 88 PID 2396 wrote to memory of 1048 2396 WScript.exe 88 PID 1048 wrote to memory of 2280 1048 cmd.exe 90 PID 1048 wrote to memory of 2280 1048 cmd.exe 90 PID 2280 wrote to memory of 1088 2280 ChainComponentBroker.exe 92 PID 2280 wrote to memory of 1088 2280 ChainComponentBroker.exe 92 PID 1088 wrote to memory of 3516 1088 cmd.exe 94 PID 1088 wrote to memory of 3516 1088 cmd.exe 94 PID 1088 wrote to memory of 4980 1088 cmd.exe 95 PID 1088 wrote to memory of 4980 1088 cmd.exe 95 PID 1088 wrote to memory of 2276 1088 cmd.exe 98 PID 1088 wrote to memory of 2276 1088 cmd.exe 98 PID 2276 wrote to memory of 3816 2276 explorer.exe 101 PID 2276 wrote to memory of 3816 2276 explorer.exe 101 PID 2276 wrote to memory of 2800 2276 explorer.exe 102 PID 2276 wrote to memory of 2800 2276 explorer.exe 102 PID 2276 wrote to memory of 1004 2276 explorer.exe 104 PID 2276 wrote to memory of 1004 2276 explorer.exe 104 PID 2276 wrote to memory of 4688 2276 explorer.exe 106 PID 2276 wrote to memory of 4688 2276 explorer.exe 106 PID 2276 wrote to memory of 1420 2276 explorer.exe 108 PID 2276 wrote to memory of 1420 2276 explorer.exe 108 PID 2800 wrote to memory of 3820 2800 cmd.exe 110 PID 2800 wrote to memory of 3820 2800 cmd.exe 110 PID 2276 wrote to memory of 1624 2276 explorer.exe 111 PID 2276 wrote to memory of 1624 2276 explorer.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\Echo test.exe"C:\Users\Admin\AppData\Local\Temp\Echo test.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\PortServerhostSvc\0u1xIFn5uBTahgPweE61XDW6gni0pA9hGvjOu.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\PortServerhostSvc\deeiCKZkZiO4AO25b.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\PortServerhostSvc\ChainComponentBroker.exe"C:\PortServerhostSvc/ChainComponentBroker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dWM1bcXvBW.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3516
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:4980
-
-
C:\Users\Default User\explorer.exe"C:\Users\Default User\explorer.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\DesktopBoom.exe"C:\DesktopBoom.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:3816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1004
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:4060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4688
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:1636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1420
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1624
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:2012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1412
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:2132
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4496
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:3180
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:4768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:3120
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:4008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4548
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4824
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:2340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:2016
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:1200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4016
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:2036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4820
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:2136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:2424
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:820
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:4568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4796
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:2784
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:2324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4532
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:3404
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4480
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:2284
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:3804
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:632
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:3896
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:984
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4600
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4756
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:2172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4948
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1828
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:4936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5048
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:3876
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1084
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4368
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:2228
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1112
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:4284
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:848
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:5564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5160
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5304
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5336
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5388
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5448
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6056
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5552
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5636
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6780
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5736
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5816
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5880
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5984
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6080
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7076
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5192
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:5584
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7264
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:412
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6224
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6324
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6388
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7524
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6436
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6520
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6568
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6624
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6716
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:6124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6788
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6864
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6952
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7020
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7100
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:6668
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7236
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7304
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7416
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7544
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:3332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7628
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7708
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7776
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7812
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7852
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:7916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7904
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7956
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7988
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8504
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8044
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:1408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8164
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:7336
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8200
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8324
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9712
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8384
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8496
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8632
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8700
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8752
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8828
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8872
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:8928
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9016
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:8532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9080
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9152
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9212
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9256
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9324
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9396
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9568
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:9964
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9620
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10736
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9664
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9748
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9844
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9900
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9972
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10100
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10160
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10216
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:9060
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:10576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10276
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10352
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10440
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10500
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10584
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10652
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10708
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10808
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11712
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10912
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11704
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10992
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11696
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11056
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11108
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11168
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11236
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11680
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:10300
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11688
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:1984
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11824
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11460
-
C:\Windows\system32\notepad.exenotepad.exe8⤵PID:11832
-
-
C:\Windows\system32\calc.execalc.exe8⤵PID:11848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ed7e9e48-6144-43af-944f-7057b5d728ac.bat" "7⤵PID:11648
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5f0a661d33aac3a3ce0c38c89bec52f89
SHA1709d6465793675208f22f779f9e070ed31d81e61
SHA256c20e78ce9028299d566684d35b1230d055e5ea0e9b94d0aff58f650e0468778a
SHA51257cdb3c38f2e90d03e6dc1f9d8d1131d40d3919f390bb1783343c82465461319e70483dc3cd3efdbd9a62dfc88d74fc706f05d760ffd8506b16fd7686e414443
-
Filesize
213B
MD51756f8178d512638ebc8309601aee1da
SHA1b860c43f352f88394555c3e9377114d03265554d
SHA2564b404d99abccf5a372b76f904723e69d2c52746305f51d26c82d4a59842e4aaa
SHA512be69f0e7ce83717de283f44e95ba46c6d192d926060315bd43c393fd5dacf89213fd41e545586c27479f678fa29ad4b4a12823c163e8d555a071488981d6b622
-
Filesize
3.5MB
MD5748b7d9fafaffefe123f11305dd0383b
SHA19e94086fce6fc65a72e2f339cb5cffeb3545390c
SHA2568c9eb584cec3f2640cbdb865cdbb38413f63e7d1485d41bde77bc56624b00890
SHA5124ab9d407d0d8f5e8ab6c9f8a802fedbfe5b49eccc590e52495dbb1ee0f948b65c7bc3aefbc94c6a500c22453114a423404e9ce00b74642d8c9314d6c032e9354
-
Filesize
88B
MD5c8423ea58aa138504ea50ad34e8dcd74
SHA1f3054ba306c1605084d4c4ac6b213b3130061d85
SHA256a02c0e705931f16ed8c56c6797eab6f0a1f14fbc4237f529244278b3c117feae
SHA5127151a7f841b05c0a1d1f48f176416ee8988508bee65f9253a9973284ab83cfdf2898ade5979bd30e5a80e2fe41cfc849ebdc8fa0b526be9369b50d32ab4d321b
-
Filesize
210B
MD56380e2faf89ca24c8445fcc46c2b42e7
SHA17b45208d799d269ac18c4b9295d7efb82eed264d
SHA256173db02f6f15ad1b199538ad9647f107ebbd56a0164ae8ace502063cd6375204
SHA5127599c7f3e37decbb633bd6ab748ad9dd812b3bed7b7b81ccc9773bfcf1261083a26c4a581c8fba744ef460f58b04c08aea23117e595cd14229065fb2d447fc0c
-
Filesize
30B
MD5acfcf241347e9ed1ac93f9d53c76479c
SHA1c9d1de51ab0f345c153b1ee59fcc43827f999506
SHA2566e260367eb1fa366e93255e6455a0bec95b9d461bc1f03cc13ceeaaca5827b5d
SHA5127ce870481f10084be6369e2f49303dc14fcb648dd5d17fe58ff901ec921268d7ccaae08bba09bbdf6498ab5123907fc77d44f6419be22fc0ecc6f96a18f65a7d