Analysis
-
max time kernel
69s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a48621abb13e400ecb43141721785dad.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_a48621abb13e400ecb43141721785dad.exe
-
Size
973KB
-
MD5
a48621abb13e400ecb43141721785dad
-
SHA1
2981fe259d18a5eabd9bb851389114177ea01845
-
SHA256
28eb637736526b8ac5edc878f794dcd56c4c5f69dced1321355422c8bfdc9417
-
SHA512
a5d664f7ffe5af7b203a9c47a6873bb9c880470024b6228812f2c178bb8a49936d80a881d188f33d454b9368590adc2495685eef612e31ca4bfcc201b9b26cc2
-
SSDEEP
12288:UEqCAs5vMlcgefuv6HM8REmcwyie4kTG5OfGmD4Igyq3ejTxA1hmKsBwtrIF+S+4:UEj75HT/VBeqV2FVFPP
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 16 IoCs
resource yara_rule behavioral1/memory/2632-4-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2632-6-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/4004-29-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/5648-40-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/4384-48-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/4868-58-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/5080-66-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/4268-76-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/5596-84-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/5740-93-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/5632-102-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/552-111-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/3716-121-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/6120-128-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/4316-138-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/3032-146-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe = "C:\\WINDOWS\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\cyborg.exe = "C:\\Users\\Admin\\AppData\\Roaming\\cyborg.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 64 IoCs
pid Process 2616 UpOUQcftPRakfJYqLe.exe 4796 UpOUQcftPRakfJYqLe.exe 4708 UpOUQcftPRakfJYqLe.exe 4864 UpOUQcftPRakfJYqLe.exe 2352 UpOUQcftPRakfJYqLe.exe 5440 UpOUQcftPRakfJYqLe.exe 4404 UpOUQcftPRakfJYqLe.exe 3748 UpOUQcftPRakfJYqLe.exe 2028 UpOUQcftPRakfJYqLe.exe 2148 UpOUQcftPRakfJYqLe.exe 2668 UpOUQcftPRakfJYqLe.exe 692 UpOUQcftPRakfJYqLe.exe 1656 UpOUQcftPRakfJYqLe.exe 1800 UpOUQcftPRakfJYqLe.exe 3152 UpOUQcftPRakfJYqLe.exe 6068 UpOUQcftPRakfJYqLe.exe 5800 UpOUQcftPRakfJYqLe.exe 4672 UpOUQcftPRakfJYqLe.exe 4256 UpOUQcftPRakfJYqLe.exe 4928 UpOUQcftPRakfJYqLe.exe 1964 UpOUQcftPRakfJYqLe.exe 1512 UpOUQcftPRakfJYqLe.exe 3260 UpOUQcftPRakfJYqLe.exe 884 UpOUQcftPRakfJYqLe.exe 2812 UpOUQcftPRakfJYqLe.exe 1760 UpOUQcftPRakfJYqLe.exe 4348 UpOUQcftPRakfJYqLe.exe 2296 UpOUQcftPRakfJYqLe.exe 2136 UpOUQcftPRakfJYqLe.exe 3960 UpOUQcftPRakfJYqLe.exe 5188 UpOUQcftPRakfJYqLe.exe 5664 UpOUQcftPRakfJYqLe.exe 2488 UpOUQcftPRakfJYqLe.exe 3084 UpOUQcftPRakfJYqLe.exe 4984 UpOUQcftPRakfJYqLe.exe 5480 UpOUQcftPRakfJYqLe.exe 2900 UpOUQcftPRakfJYqLe.exe 2972 UpOUQcftPRakfJYqLe.exe 3388 UpOUQcftPRakfJYqLe.exe 644 UpOUQcftPRakfJYqLe.exe 4344 UpOUQcftPRakfJYqLe.exe 5100 UpOUQcftPRakfJYqLe.exe 3600 UpOUQcftPRakfJYqLe.exe 6132 UpOUQcftPRakfJYqLe.exe 4848 UpOUQcftPRakfJYqLe.exe 4132 UpOUQcftPRakfJYqLe.exe 4824 UpOUQcftPRakfJYqLe.exe 2384 UpOUQcftPRakfJYqLe.exe 1428 UpOUQcftPRakfJYqLe.exe 1888 UpOUQcftPRakfJYqLe.exe 2764 UpOUQcftPRakfJYqLe.exe 1216 UpOUQcftPRakfJYqLe.exe 3288 UpOUQcftPRakfJYqLe.exe 5472 UpOUQcftPRakfJYqLe.exe 4416 UpOUQcftPRakfJYqLe.exe 6080 UpOUQcftPRakfJYqLe.exe 4772 UpOUQcftPRakfJYqLe.exe 2848 UpOUQcftPRakfJYqLe.exe 5560 UpOUQcftPRakfJYqLe.exe 2208 UpOUQcftPRakfJYqLe.exe 3748 UpOUQcftPRakfJYqLe.exe 2700 UpOUQcftPRakfJYqLe.exe 5816 UpOUQcftPRakfJYqLe.exe 4200 UpOUQcftPRakfJYqLe.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\UpOUQcftPRakfJYqLe.exe" UpOUQcftPRakfJYqLe.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1080 set thread context of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 2616 set thread context of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 4796 set thread context of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4708 set thread context of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4864 set thread context of 4868 4864 UpOUQcftPRakfJYqLe.exe 117 PID 2352 set thread context of 5080 2352 UpOUQcftPRakfJYqLe.exe 121 PID 5440 set thread context of 4268 5440 UpOUQcftPRakfJYqLe.exe 126 PID 4404 set thread context of 5596 4404 UpOUQcftPRakfJYqLe.exe 130 PID 3748 set thread context of 5740 3748 UpOUQcftPRakfJYqLe.exe 133 PID 2028 set thread context of 5632 2028 UpOUQcftPRakfJYqLe.exe 140 PID 2148 set thread context of 552 2148 UpOUQcftPRakfJYqLe.exe 145 PID 2668 set thread context of 3716 2668 UpOUQcftPRakfJYqLe.exe 149 PID 692 set thread context of 6120 692 UpOUQcftPRakfJYqLe.exe 153 PID 1656 set thread context of 4316 1656 UpOUQcftPRakfJYqLe.exe 158 PID 1800 set thread context of 3032 1800 UpOUQcftPRakfJYqLe.exe 162 PID 3152 set thread context of 4916 3152 UpOUQcftPRakfJYqLe.exe 167 PID 6068 set thread context of 1280 6068 UpOUQcftPRakfJYqLe.exe 171 PID 5800 set thread context of 4776 5800 UpOUQcftPRakfJYqLe.exe 175 PID 4672 set thread context of 5024 4672 UpOUQcftPRakfJYqLe.exe 179 PID 4256 set thread context of 2960 4256 UpOUQcftPRakfJYqLe.exe 183 PID 4928 set thread context of 5436 4928 UpOUQcftPRakfJYqLe.exe 187 PID 1964 set thread context of 464 1964 UpOUQcftPRakfJYqLe.exe 191 PID 1512 set thread context of 4448 1512 UpOUQcftPRakfJYqLe.exe 195 PID 3260 set thread context of 5520 3260 UpOUQcftPRakfJYqLe.exe 199 PID 884 set thread context of 1720 884 UpOUQcftPRakfJYqLe.exe 203 PID 2812 set thread context of 3668 2812 UpOUQcftPRakfJYqLe.exe 207 PID 1760 set thread context of 4644 1760 UpOUQcftPRakfJYqLe.exe 211 PID 4348 set thread context of 2816 4348 UpOUQcftPRakfJYqLe.exe 215 PID 2296 set thread context of 6108 2296 UpOUQcftPRakfJYqLe.exe 220 PID 2136 set thread context of 5060 2136 UpOUQcftPRakfJYqLe.exe 224 PID 3960 set thread context of 2320 3960 UpOUQcftPRakfJYqLe.exe 228 PID 5188 set thread context of 5008 5188 UpOUQcftPRakfJYqLe.exe 232 PID 5664 set thread context of 968 5664 UpOUQcftPRakfJYqLe.exe 236 PID 2488 set thread context of 5068 2488 UpOUQcftPRakfJYqLe.exe 240 PID 3084 set thread context of 1456 3084 UpOUQcftPRakfJYqLe.exe 244 PID 4984 set thread context of 840 4984 UpOUQcftPRakfJYqLe.exe 248 PID 5480 set thread context of 4460 5480 UpOUQcftPRakfJYqLe.exe 252 PID 2900 set thread context of 4636 2900 UpOUQcftPRakfJYqLe.exe 310 PID 2972 set thread context of 5828 2972 UpOUQcftPRakfJYqLe.exe 260 PID 3388 set thread context of 2448 3388 UpOUQcftPRakfJYqLe.exe 264 PID 644 set thread context of 1868 644 UpOUQcftPRakfJYqLe.exe 268 PID 4344 set thread context of 5976 4344 UpOUQcftPRakfJYqLe.exe 272 PID 5100 set thread context of 3932 5100 UpOUQcftPRakfJYqLe.exe 524 PID 3600 set thread context of 5292 3600 UpOUQcftPRakfJYqLe.exe 282 PID 6132 set thread context of 2592 6132 UpOUQcftPRakfJYqLe.exe 286 PID 4848 set thread context of 4692 4848 UpOUQcftPRakfJYqLe.exe 387 PID 4132 set thread context of 4672 4132 UpOUQcftPRakfJYqLe.exe 294 PID 4824 set thread context of 428 4824 UpOUQcftPRakfJYqLe.exe 298 PID 2384 set thread context of 1724 2384 UpOUQcftPRakfJYqLe.exe 570 PID 1428 set thread context of 2604 1428 UpOUQcftPRakfJYqLe.exe 306 PID 1888 set thread context of 4636 1888 UpOUQcftPRakfJYqLe.exe 310 PID 2764 set thread context of 1436 2764 UpOUQcftPRakfJYqLe.exe 616 PID 1216 set thread context of 468 1216 UpOUQcftPRakfJYqLe.exe 318 PID 3288 set thread context of 1484 3288 UpOUQcftPRakfJYqLe.exe 322 PID 5472 set thread context of 4584 5472 UpOUQcftPRakfJYqLe.exe 326 PID 4416 set thread context of 4332 4416 UpOUQcftPRakfJYqLe.exe 620 PID 6080 set thread context of 5296 6080 UpOUQcftPRakfJYqLe.exe 334 PID 4772 set thread context of 1880 4772 UpOUQcftPRakfJYqLe.exe 338 PID 2848 set thread context of 2280 2848 UpOUQcftPRakfJYqLe.exe 443 PID 5560 set thread context of 3476 5560 UpOUQcftPRakfJYqLe.exe 344 PID 2208 set thread context of 3172 2208 UpOUQcftPRakfJYqLe.exe 350 PID 3748 set thread context of 1528 3748 UpOUQcftPRakfJYqLe.exe 354 PID 2700 set thread context of 5192 2700 UpOUQcftPRakfJYqLe.exe 704 PID 5816 set thread context of 752 5816 UpOUQcftPRakfJYqLe.exe 362 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpOUQcftPRakfJYqLe.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4800 reg.exe 3960 reg.exe 4528 reg.exe 4744 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 2632 vbc.exe Token: SeCreateTokenPrivilege 2632 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2632 vbc.exe Token: SeLockMemoryPrivilege 2632 vbc.exe Token: SeIncreaseQuotaPrivilege 2632 vbc.exe Token: SeMachineAccountPrivilege 2632 vbc.exe Token: SeTcbPrivilege 2632 vbc.exe Token: SeSecurityPrivilege 2632 vbc.exe Token: SeTakeOwnershipPrivilege 2632 vbc.exe Token: SeLoadDriverPrivilege 2632 vbc.exe Token: SeSystemProfilePrivilege 2632 vbc.exe Token: SeSystemtimePrivilege 2632 vbc.exe Token: SeProfSingleProcessPrivilege 2632 vbc.exe Token: SeIncBasePriorityPrivilege 2632 vbc.exe Token: SeCreatePagefilePrivilege 2632 vbc.exe Token: SeCreatePermanentPrivilege 2632 vbc.exe Token: SeBackupPrivilege 2632 vbc.exe Token: SeRestorePrivilege 2632 vbc.exe Token: SeShutdownPrivilege 2632 vbc.exe Token: SeDebugPrivilege 2632 vbc.exe Token: SeAuditPrivilege 2632 vbc.exe Token: SeSystemEnvironmentPrivilege 2632 vbc.exe Token: SeChangeNotifyPrivilege 2632 vbc.exe Token: SeRemoteShutdownPrivilege 2632 vbc.exe Token: SeUndockPrivilege 2632 vbc.exe Token: SeSyncAgentPrivilege 2632 vbc.exe Token: SeEnableDelegationPrivilege 2632 vbc.exe Token: SeManageVolumePrivilege 2632 vbc.exe Token: SeImpersonatePrivilege 2632 vbc.exe Token: SeCreateGlobalPrivilege 2632 vbc.exe Token: 31 2632 vbc.exe Token: 32 2632 vbc.exe Token: 33 2632 vbc.exe Token: 34 2632 vbc.exe Token: 35 2632 vbc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2632 vbc.exe 2632 vbc.exe 2632 vbc.exe 4004 vbc.exe 4004 vbc.exe 5648 vbc.exe 5648 vbc.exe 4384 vbc.exe 4384 vbc.exe 4868 vbc.exe 4868 vbc.exe 5080 vbc.exe 5080 vbc.exe 4268 vbc.exe 4268 vbc.exe 5596 vbc.exe 5596 vbc.exe 5740 vbc.exe 5740 vbc.exe 5632 vbc.exe 5632 vbc.exe 552 vbc.exe 552 vbc.exe 3716 vbc.exe 3716 vbc.exe 6120 vbc.exe 6120 vbc.exe 4316 vbc.exe 4316 vbc.exe 3032 vbc.exe 3032 vbc.exe 4916 vbc.exe 4916 vbc.exe 1280 vbc.exe 1280 vbc.exe 4776 vbc.exe 4776 vbc.exe 5024 vbc.exe 5024 vbc.exe 2960 vbc.exe 2960 vbc.exe 5436 vbc.exe 5436 vbc.exe 464 vbc.exe 464 vbc.exe 4448 vbc.exe 4448 vbc.exe 5520 vbc.exe 5520 vbc.exe 1720 vbc.exe 1720 vbc.exe 3668 vbc.exe 3668 vbc.exe 4644 vbc.exe 4644 vbc.exe 2816 vbc.exe 2816 vbc.exe 6108 vbc.exe 6108 vbc.exe 5060 vbc.exe 5060 vbc.exe 2320 vbc.exe 2320 vbc.exe 5008 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 1080 wrote to memory of 2632 1080 JaffaCakes118_a48621abb13e400ecb43141721785dad.exe 88 PID 6068 wrote to memory of 2616 6068 cmd.exe 89 PID 6068 wrote to memory of 2616 6068 cmd.exe 89 PID 6068 wrote to memory of 2616 6068 cmd.exe 89 PID 2632 wrote to memory of 6012 2632 vbc.exe 90 PID 2632 wrote to memory of 6012 2632 vbc.exe 90 PID 2632 wrote to memory of 6012 2632 vbc.exe 90 PID 2632 wrote to memory of 5084 2632 vbc.exe 91 PID 2632 wrote to memory of 5084 2632 vbc.exe 91 PID 2632 wrote to memory of 5084 2632 vbc.exe 91 PID 2632 wrote to memory of 5032 2632 vbc.exe 92 PID 2632 wrote to memory of 5032 2632 vbc.exe 92 PID 2632 wrote to memory of 5032 2632 vbc.exe 92 PID 2632 wrote to memory of 4400 2632 vbc.exe 93 PID 2632 wrote to memory of 4400 2632 vbc.exe 93 PID 2632 wrote to memory of 4400 2632 vbc.exe 93 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 2616 wrote to memory of 4004 2616 UpOUQcftPRakfJYqLe.exe 97 PID 5084 wrote to memory of 3960 5084 cmd.exe 101 PID 5084 wrote to memory of 3960 5084 cmd.exe 101 PID 5084 wrote to memory of 3960 5084 cmd.exe 101 PID 6012 wrote to memory of 4528 6012 cmd.exe 102 PID 6012 wrote to memory of 4528 6012 cmd.exe 102 PID 6012 wrote to memory of 4528 6012 cmd.exe 102 PID 4400 wrote to memory of 4744 4400 cmd.exe 103 PID 4400 wrote to memory of 4744 4400 cmd.exe 103 PID 4400 wrote to memory of 4744 4400 cmd.exe 103 PID 4652 wrote to memory of 4796 4652 cmd.exe 104 PID 4652 wrote to memory of 4796 4652 cmd.exe 104 PID 4652 wrote to memory of 4796 4652 cmd.exe 104 PID 5032 wrote to memory of 4800 5032 cmd.exe 105 PID 5032 wrote to memory of 4800 5032 cmd.exe 105 PID 5032 wrote to memory of 4800 5032 cmd.exe 105 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4740 wrote to memory of 4708 4740 cmd.exe 109 PID 4740 wrote to memory of 4708 4740 cmd.exe 109 PID 4740 wrote to memory of 4708 4740 cmd.exe 109 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4796 wrote to memory of 5648 4796 UpOUQcftPRakfJYqLe.exe 108 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112 PID 4708 wrote to memory of 4384 4708 UpOUQcftPRakfJYqLe.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a48621abb13e400ecb43141721785dad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a48621abb13e400ecb43141721785dad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:6012 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\cyborg.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cyborg.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\cyborg.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\cyborg.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:4744
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵
- Suspicious use of WriteProcessMemory
PID:6068 -
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4864 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2352 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5440 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4404 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3748 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2028 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2148 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2668 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:692 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:6120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5804
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1656 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1800 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3152 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6068 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5800 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4672 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4256 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4928 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1964 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1512 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5692
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3260 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5224
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:884 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1760 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4348 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2296 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:6108
-
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:1656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5876
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3960 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:5188 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5664 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2488 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5580
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3084 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4984 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5480 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4460
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2900 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2972 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3388 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:644 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4344 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5100 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3600 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5292
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6132 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4848 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4132 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4824 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2384 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1428 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5852
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1888 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5332
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2764 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1216 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3288 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5472 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4416 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6080 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4772 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2848 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5560 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3476
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2208 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3748 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2700 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5816 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Executes dropped EXE
PID:4200 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5944
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4524
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3756
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1100
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5672
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3024 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4692
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:64
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5372
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2408
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2384
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5036
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:776
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5604
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5432
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3848
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4140
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5804
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:744
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1748
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2916
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5064
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2280
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:5048 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5912
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:688 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3544
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2028
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5868
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4524
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2432 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4360
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4016
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3324
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4920
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4792
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5768
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2068
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5380
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5356
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5456
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3544
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1352
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6044
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4348 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2288
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5720
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4924
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4668
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4608
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4412
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1972
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1548
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4740
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5212
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:912 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3496
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5864
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4656
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:908 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2276 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4980
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3420 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5084
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2808
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3744
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4632
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1776
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2392
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3424 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:6032 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1624
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2700
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2660
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:5272 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1100
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5936
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3216
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:2388 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4680
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1548
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5560
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1776
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3740 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4508 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4288
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:5720 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1748
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5888
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3612
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3292
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2008
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5672
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4792
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2148
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2156
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5192
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2540 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4928 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1256 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:5868
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3632
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5428
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3936
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4252
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:4972 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4608
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6080
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4692 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:912
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1296
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4296 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4784
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:884
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5040
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2660
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2276 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2364
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2620
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:5224 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1176
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4328
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4820 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4684
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6020 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2472 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4936
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3772
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5164
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1716 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:6000
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2364
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1568
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2444
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1548
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1116
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3944
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4464 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5796
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:884 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:5584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4624
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4588
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1100
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4708 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:116
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2552
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:6084
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4940
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3960
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3956
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:5788 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2568 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4596
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5524
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:5804 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:908
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1756
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5952
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3932
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3324
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2104 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4412
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4608
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:3976 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:776 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5304
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3632
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1284
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5804
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1632
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4852
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4900
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5576
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:5448 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4940 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4132
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5240
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5096
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4284
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:4760 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3848
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2912
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4680
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4896
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4124
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2972
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:3172 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1800
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3536 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:244
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4792
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:6016 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5796
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4284
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1752
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4476 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:3848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2956
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1432 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:4312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4500
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2616 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5888
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5880
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1512
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2408
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5004
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4520
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1168
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1256
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:5044 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5876
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5588
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4192
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:4680 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:5164
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5952
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2240
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:5604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1964
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4712
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2624 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3696
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3028 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3944
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5272
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1840
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:5876 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1724
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1432 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:2352 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1564
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1008 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1548
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5004
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5220
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5788
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3104
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1040
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4588 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3932
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5560
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4980
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2444
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:6036
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4752
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5240
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5812
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4912 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4792
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4484 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5036
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1116 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2008
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1432
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1048
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4740
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1716
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1160
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3632
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1352
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4792
-
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:4956
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4508
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4400
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1116
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5980
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3288
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5636
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1432
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4252
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4940
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4744
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:516
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5332
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:936 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2356
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1552
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:5992 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:6116
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2616
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5316
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5716
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4896
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4236
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4908
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2232
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3228
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4720
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:4508 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3884
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5980
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:6020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:208 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1216
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4944
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2624
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3856
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:2664
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4596
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1692 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- System Location Discovery: System Language Discovery
PID:1840 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:1516 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵
- Adds Run key to start application
PID:3612 -
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:208
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4396
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5316
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:1776
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:3304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3856
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:4656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:5800
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:1700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:4596
-
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵PID:5396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe1⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exeC:\Users\Admin\AppData\Local\Temp\UpOUQcftPRakfJYqLe.exe2⤵PID:3976
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5fbcc48ddf361df41da6b0400718841f8
SHA1b6d3641dc3c8186662f3906a350e355f47e373e3
SHA256ecb300191d0e3420d114338ed6850afa649b270f75c181ffe86b435420100870
SHA5121d9d8e3335423152e7b19bc3b0ac8f04d318c342cfeb1567b9b82f0dde0e3d3f57c3fb7c312fbca7d9f46ba2383f32a2abc90df9a924f27da43f854bd490e578
-
Filesize
973KB
MD5a48621abb13e400ecb43141721785dad
SHA12981fe259d18a5eabd9bb851389114177ea01845
SHA25628eb637736526b8ac5edc878f794dcd56c4c5f69dced1321355422c8bfdc9417
SHA512a5d664f7ffe5af7b203a9c47a6873bb9c880470024b6228812f2c178bb8a49936d80a881d188f33d454b9368590adc2495685eef612e31ca4bfcc201b9b26cc2