Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
activsky.exe
Resource
win10v2004-20250410-en
General
-
Target
activsky.exe
-
Size
1.3MB
-
MD5
6ae22628035c2a1876b004ecd790fb71
-
SHA1
7a5fa1a07f8618b53c9f82b2dab9b776aebc28a7
-
SHA256
43181188b83edadb44e2b8e3c68712031dbe0e74f5842eb13165479e0a6b5be2
-
SHA512
5fac40cd6c31bf77898db633e1b15193da0ecc5f34c0b473396fa6d1cfd4683c37738b4c1d45333b039dd1efe4fca2c1e57693d0cc65d10db735289b5ce64948
-
SSDEEP
24576:0njz8owghhbbR4EdchKOCF2tEgXHKOYsuM3WBA0XGDXd+DxR5R8a6:0j/zt4EdWKn2nNYsuMuALDXuxnN6
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2168-68-0x0000000000400000-0x0000000000470000-memory.dmp family_isrstealer behavioral1/memory/2168-66-0x0000000000400000-0x0000000000470000-memory.dmp family_isrstealer -
Isrstealer family
-
Detected Nirsoft tools 44 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/6136-103-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/5296-98-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral1/memory/4172-97-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/4172-93-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/6136-89-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/6136-87-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/5296-81-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral1/memory/5296-79-0x0000000000400000-0x0000000000454000-memory.dmp Nirsoft behavioral1/memory/3204-255-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/5968-292-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/3204-298-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2356-291-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1536-284-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/5556-274-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/5968-273-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/4200-254-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/2356-253-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/5232-252-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/636-240-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/4676-212-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/116-370-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/1748-388-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/712-387-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/3884-441-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/868-438-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/4900-548-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/632-554-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/1032-546-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/3740-544-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1080-541-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/5680-532-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/4900-531-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1200-523-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/3740-507-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/1200-506-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/632-505-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/1032-504-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/1148-503-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/4412-465-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/1916-416-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/712-410-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/4684-558-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft behavioral1/memory/3884-371-0x0000000000400000-0x0000000000426000-memory.dmp Nirsoft behavioral1/memory/1324-385-0x0000000000400000-0x000000000041F000-memory.dmp Nirsoft -
NirSoft MailPassView 19 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/4172-97-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/4172-93-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/3204-255-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/3204-298-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/2356-291-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1536-284-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/4200-254-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/2356-253-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/712-387-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/868-438-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/4900-548-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/3740-544-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/5680-532-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/4900-531-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/3740-507-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1916-416-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/712-410-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/4684-558-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView behavioral1/memory/1324-385-0x0000000000400000-0x000000000041F000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/5296-98-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral1/memory/5296-81-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView behavioral1/memory/5296-79-0x0000000000400000-0x0000000000454000-memory.dmp WebBrowserPassView -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation activsky.exe Key value queried \REGISTRY\USER\S-1-5-21-3078542121-369484597-920690335-1000\Control Panel\International\Geo\Nation activsky.exe -
Executes dropped EXE 2 IoCs
pid Process 3164 fuck.exe 4076 fuck.exe -
AutoIT Executable 55 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/4076-13-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2484-16-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3848-19-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4596-29-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4076-33-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3164-32-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4904-58-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/5984-65-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3848-60-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4476-70-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4596-75-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/5500-44-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2484-53-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3912-101-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/716-96-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3676-107-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2164-301-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3360-306-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4176-305-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4996-304-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4884-303-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2524-302-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3676-300-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/6052-299-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/6052-312-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4784-315-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4160-314-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2164-321-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4884-323-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3384-313-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3360-343-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2524-347-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4944-175-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/2524-170-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/60-166-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/716-154-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4904-144-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4460-127-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/1248-123-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3912-121-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/5984-119-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/1068-389-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3384-439-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/5776-456-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/1324-534-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/1288-556-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/5840-555-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/1068-535-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4784-434-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4160-431-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/3676-426-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4176-418-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/4996-417-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/5040-429-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe behavioral1/memory/1348-559-0x0000000000400000-0x00000000004D6000-memory.dmp autoit_exe -
resource yara_rule behavioral1/files/0x00130000000236f4-4.dat upx behavioral1/memory/3164-10-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4076-13-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/2484-16-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3848-19-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4596-29-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4076-33-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3164-32-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4904-58-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/5984-65-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3848-60-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4476-70-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4596-75-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/5500-44-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/2484-53-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/6136-103-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/3912-101-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4172-97-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/716-96-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4172-93-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/4172-92-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/4172-90-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/6136-89-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/6136-87-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/6136-86-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/6136-84-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/3676-107-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3204-255-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/5968-292-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/2164-301-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3360-306-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4176-305-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4996-304-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4884-303-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/2524-302-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3676-300-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/6052-299-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3204-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2356-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1536-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/5556-274-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/5968-273-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/6052-312-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4200-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2356-253-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/5232-252-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/636-240-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/4784-315-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4160-314-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/2164-321-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4884-323-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3384-313-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4676-212-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/3360-343-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/2524-347-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4944-175-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/2524-170-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/60-166-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/716-154-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4904-144-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/4460-127-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/1248-123-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/3912-121-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral1/memory/5984-119-0x0000000000400000-0x00000000004D6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 16016 16468 Process not Found 4326 9480 15052 Process not Found 4331 19724 13076 Process not Found 4338 17496 14800 Process not Found 4386 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language activsky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language activsky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language activsky.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2792 wrote to memory of 4084 2792 activsky.exe 340 PID 2792 wrote to memory of 4084 2792 activsky.exe 340 PID 2792 wrote to memory of 4084 2792 activsky.exe 340 PID 2792 wrote to memory of 3164 2792 activsky.exe 87 PID 2792 wrote to memory of 3164 2792 activsky.exe 87 PID 2792 wrote to memory of 3164 2792 activsky.exe 87 PID 4084 wrote to memory of 4684 4084 activsky.exe 260 PID 4084 wrote to memory of 4684 4084 activsky.exe 260 PID 4084 wrote to memory of 4684 4084 activsky.exe 260 PID 4084 wrote to memory of 4076 4084 activsky.exe 89 PID 4084 wrote to memory of 4076 4084 activsky.exe 89 PID 4084 wrote to memory of 4076 4084 activsky.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"4⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"5⤵PID:5932
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"6⤵PID:5848
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"7⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"8⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"9⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"10⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"11⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"12⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"13⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"14⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"15⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"16⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"17⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"18⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"19⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"20⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"21⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"22⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"23⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"24⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"25⤵PID:6320
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"26⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"27⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"28⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"29⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"30⤵PID:7248
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"31⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"32⤵PID:8856
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"33⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"34⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"35⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"36⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"37⤵PID:8616
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"38⤵PID:7392
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"39⤵PID:7728
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"40⤵PID:7784
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"41⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"42⤵PID:9396
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"43⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"44⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\activsky.exe"C:\Users\Admin\AppData\Local\Temp\activsky.exe"45⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"45⤵PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"44⤵PID:10144
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"43⤵PID:9932
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"42⤵PID:9540
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"41⤵PID:7000
-
C:\Users\Admin\AppData\Roaming\14345fuck.exeC:\Users\Admin\AppData\Roaming\14345fuck.exe42⤵PID:7284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd42⤵PID:8448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"40⤵PID:7444
-
C:\Users\Admin\AppData\Roaming\98656fuck.exeC:\Users\Admin\AppData\Roaming\98656fuck.exe41⤵PID:9696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd41⤵PID:10100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"39⤵PID:7908
-
C:\Users\Admin\AppData\Roaming\40330fuck.exeC:\Users\Admin\AppData\Roaming\40330fuck.exe40⤵PID:10152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd40⤵PID:10016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"38⤵PID:7756
-
C:\Users\Admin\AppData\Roaming\94167fuck.exeC:\Users\Admin\AppData\Roaming\94167fuck.exe39⤵PID:9584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd39⤵PID:9612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"37⤵PID:3552
-
C:\Users\Admin\AppData\Roaming\58226fuck.exeC:\Users\Admin\AppData\Roaming\58226fuck.exe38⤵PID:1924
-
C:\Users\Admin\AppData\Roaming\58226fuck.exe"C:\Users\Admin\AppData\Roaming\58226fuck.exe"39⤵PID:6152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd38⤵PID:8868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"36⤵PID:7088
-
C:\Users\Admin\AppData\Roaming\53180fuck.exeC:\Users\Admin\AppData\Roaming\53180fuck.exe37⤵PID:7800
-
C:\Users\Admin\AppData\Roaming\53180fuck.exe"C:\Users\Admin\AppData\Roaming\53180fuck.exe"38⤵PID:9132
-
C:\Users\Admin\AppData\Roaming\53180fuck.exe"C:\Users\Admin\AppData\Roaming\53180fuck.exe"39⤵PID:8244
-
C:\Users\Admin\AppData\Roaming\53180fuck.exe"C:\Users\Admin\AppData\Roaming\53180fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp40⤵PID:728
-
-
C:\Users\Admin\AppData\Roaming\53180fuck.exe"C:\Users\Admin\AppData\Roaming\53180fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp40⤵PID:1728
-
-
C:\Users\Admin\AppData\Roaming\53180fuck.exe"C:\Users\Admin\AppData\Roaming\53180fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp40⤵PID:8660
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd37⤵PID:7952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"35⤵PID:7936
-
C:\Users\Admin\AppData\Roaming\92981fuck.exeC:\Users\Admin\AppData\Roaming\92981fuck.exe36⤵PID:8216
-
C:\Users\Admin\AppData\Roaming\92981fuck.exe"C:\Users\Admin\AppData\Roaming\92981fuck.exe"37⤵PID:9820
-
C:\Users\Admin\AppData\Roaming\92981fuck.exe"C:\Users\Admin\AppData\Roaming\92981fuck.exe"38⤵PID:7808
-
C:\Users\Admin\AppData\Roaming\92981fuck.exe"C:\Users\Admin\AppData\Roaming\92981fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp39⤵PID:1744
-
-
C:\Users\Admin\AppData\Roaming\92981fuck.exe"C:\Users\Admin\AppData\Roaming\92981fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp39⤵PID:10104
-
-
C:\Users\Admin\AppData\Roaming\92981fuck.exe"C:\Users\Admin\AppData\Roaming\92981fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp39⤵PID:4624
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd36⤵PID:8760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"34⤵PID:7500
-
C:\Users\Admin\AppData\Roaming\62884fuck.exeC:\Users\Admin\AppData\Roaming\62884fuck.exe35⤵PID:7808
-
C:\Users\Admin\AppData\Roaming\62884fuck.exe"C:\Users\Admin\AppData\Roaming\62884fuck.exe"36⤵PID:5252
-
C:\Users\Admin\AppData\Roaming\62884fuck.exe"C:\Users\Admin\AppData\Roaming\62884fuck.exe"37⤵PID:10140
-
C:\Users\Admin\AppData\Roaming\62884fuck.exe"C:\Users\Admin\AppData\Roaming\62884fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp38⤵PID:1852
-
-
C:\Users\Admin\AppData\Roaming\62884fuck.exe"C:\Users\Admin\AppData\Roaming\62884fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp38⤵PID:9992
-
-
C:\Users\Admin\AppData\Roaming\62884fuck.exe"C:\Users\Admin\AppData\Roaming\62884fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp38⤵PID:7832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd35⤵PID:3696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"33⤵PID:8928
-
C:\Users\Admin\AppData\Roaming\93059fuck.exeC:\Users\Admin\AppData\Roaming\93059fuck.exe34⤵PID:3732
-
C:\Users\Admin\AppData\Roaming\93059fuck.exe"C:\Users\Admin\AppData\Roaming\93059fuck.exe"35⤵PID:9084
-
C:\Users\Admin\AppData\Roaming\93059fuck.exe"C:\Users\Admin\AppData\Roaming\93059fuck.exe"36⤵PID:7824
-
C:\Users\Admin\AppData\Roaming\93059fuck.exe"C:\Users\Admin\AppData\Roaming\93059fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp37⤵PID:6008
-
-
C:\Users\Admin\AppData\Roaming\93059fuck.exe"C:\Users\Admin\AppData\Roaming\93059fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp37⤵PID:3360
-
-
C:\Users\Admin\AppData\Roaming\93059fuck.exe"C:\Users\Admin\AppData\Roaming\93059fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp37⤵PID:7620
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd34⤵PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"32⤵PID:9068
-
C:\Users\Admin\AppData\Roaming\83230fuck.exeC:\Users\Admin\AppData\Roaming\83230fuck.exe33⤵PID:8688
-
C:\Users\Admin\AppData\Roaming\83230fuck.exe"C:\Users\Admin\AppData\Roaming\83230fuck.exe"34⤵PID:1408
-
C:\Users\Admin\AppData\Roaming\83230fuck.exe"C:\Users\Admin\AppData\Roaming\83230fuck.exe"35⤵PID:5180
-
C:\Users\Admin\AppData\Roaming\83230fuck.exe"C:\Users\Admin\AppData\Roaming\83230fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp36⤵PID:4292
-
-
C:\Users\Admin\AppData\Roaming\83230fuck.exe"C:\Users\Admin\AppData\Roaming\83230fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp36⤵PID:8952
-
-
C:\Users\Admin\AppData\Roaming\83230fuck.exe"C:\Users\Admin\AppData\Roaming\83230fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp36⤵PID:7652
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd33⤵PID:2692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"31⤵PID:2088
-
C:\Users\Admin\AppData\Roaming\68856fuck.exeC:\Users\Admin\AppData\Roaming\68856fuck.exe32⤵PID:6208
-
C:\Users\Admin\AppData\Roaming\68856fuck.exe"C:\Users\Admin\AppData\Roaming\68856fuck.exe"33⤵PID:7308
-
C:\Users\Admin\AppData\Roaming\68856fuck.exe"C:\Users\Admin\AppData\Roaming\68856fuck.exe"34⤵PID:7692
-
C:\Users\Admin\AppData\Roaming\68856fuck.exe"C:\Users\Admin\AppData\Roaming\68856fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp35⤵PID:7868
-
-
C:\Users\Admin\AppData\Roaming\68856fuck.exe"C:\Users\Admin\AppData\Roaming\68856fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp35⤵PID:8616
-
-
C:\Users\Admin\AppData\Roaming\68856fuck.exe"C:\Users\Admin\AppData\Roaming\68856fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp35⤵PID:5840
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd32⤵PID:6568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"30⤵PID:7416
-
C:\Users\Admin\AppData\Roaming\82402fuck.exeC:\Users\Admin\AppData\Roaming\82402fuck.exe31⤵PID:672
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"32⤵PID:5620
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"33⤵PID:2380
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp34⤵PID:4284
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp34⤵PID:5348
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp34⤵PID:8336
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd31⤵PID:8268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"29⤵PID:1680
-
C:\Users\Admin\AppData\Roaming\82402fuck.exeC:\Users\Admin\AppData\Roaming\82402fuck.exe30⤵PID:6000
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"31⤵PID:3484
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"32⤵PID:2208
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp33⤵PID:3208
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp33⤵PID:4020
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp33⤵PID:9128
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd30⤵PID:8596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"28⤵PID:4228
-
C:\Users\Admin\AppData\Roaming\44960fuck.exeC:\Users\Admin\AppData\Roaming\44960fuck.exe29⤵PID:8416
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe"30⤵PID:3384
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe"31⤵PID:4220
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp32⤵PID:3732
-
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp32⤵PID:5064
-
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp32⤵PID:6396
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd29⤵PID:8436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"27⤵PID:5448
-
C:\Users\Admin\AppData\Roaming\12780fuck.exeC:\Users\Admin\AppData\Roaming\12780fuck.exe28⤵PID:8060
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe"29⤵PID:1612
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe"30⤵PID:60
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp31⤵PID:7032
-
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp31⤵PID:8356
-
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp31⤵PID:9180
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd28⤵PID:6856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"26⤵PID:3924
-
C:\Users\Admin\AppData\Roaming\50475fuck.exeC:\Users\Admin\AppData\Roaming\50475fuck.exe27⤵PID:7448
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"28⤵PID:4760
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"29⤵PID:6500
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp30⤵PID:2032
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp30⤵PID:4408
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp30⤵PID:4820
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd27⤵PID:7464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"25⤵PID:7028
-
C:\Users\Admin\AppData\Roaming\50475fuck.exeC:\Users\Admin\AppData\Roaming\50475fuck.exe26⤵PID:7256
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"27⤵PID:4544
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"28⤵PID:5844
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp29⤵PID:4840
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp29⤵PID:5420
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp29⤵PID:6944
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd26⤵PID:7276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"24⤵PID:5576
-
C:\Users\Admin\AppData\Roaming\17198fuck.exeC:\Users\Admin\AppData\Roaming\17198fuck.exe25⤵PID:6608
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe"26⤵PID:5388
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe"27⤵PID:8388
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp28⤵PID:8468
-
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp28⤵PID:8512
-
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp28⤵PID:8600
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd25⤵PID:2484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"23⤵PID:4492
-
C:\Users\Admin\AppData\Roaming\25756fuck.exeC:\Users\Admin\AppData\Roaming\25756fuck.exe24⤵PID:6156
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe"25⤵PID:2540
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe"26⤵PID:6284
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp27⤵PID:5804
-
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp27⤵PID:7428
-
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp27⤵PID:1076
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd24⤵PID:3064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"22⤵PID:3360
-
C:\Users\Admin\AppData\Roaming\33422fuck.exeC:\Users\Admin\AppData\Roaming\33422fuck.exe23⤵PID:5864
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe"24⤵PID:6952
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe"25⤵PID:4812
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp26⤵PID:7364
-
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp26⤵PID:7576
-
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp26⤵PID:7736
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd23⤵PID:892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"21⤵PID:2404
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe22⤵PID:6608
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"23⤵PID:7040
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"24⤵PID:704
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp25⤵PID:5212
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp25⤵PID:4780
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp25⤵PID:5384
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd22⤵PID:6624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"20⤵PID:3356
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe21⤵PID:6504
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"22⤵PID:1224
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"23⤵PID:2084
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp24⤵PID:4608
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp24⤵PID:2680
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp24⤵PID:4516
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd21⤵PID:6524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"19⤵PID:5448
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe20⤵PID:6324
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"21⤵PID:2848
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"22⤵PID:748
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp23⤵PID:5064
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp23⤵PID:4552
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp23⤵PID:2428
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd20⤵PID:6340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"18⤵PID:5768
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe19⤵PID:4136
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"20⤵PID:1324
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"21⤵PID:7060
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp22⤵PID:6956
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp22⤵PID:4952
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp22⤵PID:6932
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd19⤵PID:4748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"17⤵PID:4704
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe18⤵PID:4688
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"19⤵PID:6964
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"20⤵PID:4956
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp21⤵PID:5776
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp21⤵PID:6416
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp21⤵PID:7012
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd18⤵PID:5684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"16⤵PID:1956
-
C:\Users\Admin\AppData\Roaming\45292fuck.exeC:\Users\Admin\AppData\Roaming\45292fuck.exe17⤵PID:4952
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"18⤵PID:824
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"19⤵PID:936
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp20⤵PID:6148
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp20⤵PID:6364
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp20⤵PID:6556
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd17⤵PID:4620
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"13⤵PID:1068
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe14⤵PID:1324
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"15⤵PID:4260
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"16⤵PID:4904
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp17⤵PID:4464
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp17⤵PID:5572
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp17⤵PID:5856
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd14⤵PID:5924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"12⤵PID:3384
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe13⤵PID:692
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"14⤵PID:4848
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"15⤵PID:1496
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp16⤵PID:4652
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp16⤵PID:3532
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp16⤵PID:3992
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd13⤵PID:3216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"11⤵PID:6052
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe12⤵PID:4160
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"13⤵PID:5020
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"14⤵PID:4876
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp15⤵PID:4856
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp15⤵PID:632
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp15⤵PID:5680
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd12⤵PID:4936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"10⤵PID:3676
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe11⤵PID:5840
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"12⤵PID:1828
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"13⤵PID:1172
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp14⤵PID:2164
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp14⤵PID:6072
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp14⤵PID:2352
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd11⤵PID:4348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"9⤵PID:716
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe10⤵PID:2524
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"11⤵PID:3476
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"12⤵PID:5236
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp13⤵PID:920
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp13⤵PID:1748
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp13⤵PID:1916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd10⤵PID:940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"8⤵PID:4944
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe9⤵PID:3360
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"10⤵PID:4368
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"11⤵PID:3908
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp12⤵PID:3604
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp12⤵PID:4412
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp12⤵PID:868
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd9⤵PID:5664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"7⤵PID:4476
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe8⤵PID:5984
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"9⤵PID:5696
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"10⤵PID:1804
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp11⤵PID:5484
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp11⤵PID:5232
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp11⤵PID:4628
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd8⤵PID:4428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"6⤵PID:3848
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe7⤵PID:4904
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"8⤵PID:6092
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"9⤵PID:5996
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp10⤵PID:3376
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp10⤵PID:5968
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp10⤵PID:5812
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd7⤵PID:4808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"5⤵PID:5500
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe6⤵PID:60
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"7⤵PID:6132
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"8⤵PID:2132
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp9⤵PID:4288
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp9⤵PID:5556
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp9⤵PID:1536
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd6⤵PID:5436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"4⤵PID:2484
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe5⤵PID:1248
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"6⤵PID:2972
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"7⤵PID:3080
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp8⤵PID:1920
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp8⤵PID:4676
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp8⤵PID:2356
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe4⤵PID:4596
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"5⤵PID:2168
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"6⤵PID:4532
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp7⤵PID:5296
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp7⤵PID:6136
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp7⤵PID:4172
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd4⤵PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\fuck.exe"C:\Users\Admin\AppData\Local\Temp\fuck.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe3⤵PID:4460
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4048
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"5⤵PID:1632
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp6⤵PID:424
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp6⤵PID:384
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp6⤵PID:4200
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Tempscratch.cmd3⤵PID:4584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1580
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:3912
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:5832
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:1832
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2628
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:636
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:3204
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:5328
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4884
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:1048
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:1084
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3736
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3884
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:712
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:2864
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5040
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:2248
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4496
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:760
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1148
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:3740
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4148
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:2164
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:316
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:1644
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4460
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:116
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:1324
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1076
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4784
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4636
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:2076
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4884
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1032
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4684
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:3964
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4176
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:812
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:5808
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3416
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1080
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4900
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4224
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4996
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:2904
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4396
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4232
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1200
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5084
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:5460
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:1348
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:6792
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:6300
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4564
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6780
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:3728
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4408
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5076
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4244
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4216
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4728
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3028
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5400
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:5876
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:1288
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:6804
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:7036
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3024
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6256
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7080
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:3236
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5776
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4436
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4400
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4524
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5608
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4944
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\31158fuck.exe1⤵PID:1012
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe2⤵PID:4292
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"3⤵PID:4980
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"4⤵PID:4700
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2396
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3800
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4380
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:5588
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:2584
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:5972
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:1228
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4488
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5184
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5700
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:5820
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4504
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:2684
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:1456
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:5664
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:4084
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4964
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1460
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5748
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:392
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4736
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6104
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5976
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4036
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4880
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:2148
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4348
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:3704
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3996
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:2196
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:2912
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4320
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5776
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:696
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:4880
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3496
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1516
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:2148
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\59466fuck.exe1⤵PID:3884
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe2⤵PID:5840
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"3⤵PID:1312
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"4⤵PID:4132
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4176
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3360
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5940
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:4528
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:3568
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:2052
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:2080
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1596
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:544
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5072
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:4324
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:5908
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:3764
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:5244
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:5932
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5256
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4316
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:5252
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:7044
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:6536
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:4536
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6332
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:2680
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6508
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:4632
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:7032
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:6424
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:2288
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1452
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5488
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6320
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\31158fuck.exe1⤵PID:1056
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe2⤵PID:2900
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"3⤵PID:5392
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"4⤵PID:5880
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2416
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6288
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6480
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:5344
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4588
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:408
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:5088
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2900
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6316
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6496
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:5024
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:1280
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4788
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:5260
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6280
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6468
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6724
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:2244
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:2484
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:3792
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:7004
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4768
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6404
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6876
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1704
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:1728
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4376
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:716
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3268
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6276
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:3724
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4956
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5844
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:6596
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:1280
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1544
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5076
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6448
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:5668
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:2288
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:1660
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:6648
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6968
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7152
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4872
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:1196
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:1364
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:6248
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:6884
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6768
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3144
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6832
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\59466fuck.exe1⤵PID:692
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe2⤵PID:4888
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"3⤵PID:396
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"4⤵PID:3356
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7052
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5072
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4372
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4264
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4468
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4820
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:5264
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6232
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6432
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6688
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\31158fuck.exe1⤵PID:2584
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe2⤵PID:7092
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"3⤵PID:3512
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"4⤵PID:1932
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7372
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7584
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7748
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4428
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5840
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:2680
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:3840
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2800
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7200
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7312
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\45292fuck.exe1⤵PID:2192
-
C:\Users\Admin\AppData\Roaming\45292fuck.exeC:\Users\Admin\AppData\Roaming\45292fuck.exe2⤵PID:5344
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"3⤵PID:7292
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"4⤵PID:7980
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8108
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7092
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4268
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:2196
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:6268
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:7300
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:7992
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8148
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7220
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7024
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:5632
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4160
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:968
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:7848
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:5352
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7520
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5132
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:464
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:7148
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:7864
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:7268
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:5436
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:2524
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5164
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4692
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:2652
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:8016
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:7688
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7204
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7960
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:1332
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:1076
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:6568
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:8156
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:5060
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3924
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:2384
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8052
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1956
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:5432
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:5508
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:6784
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3156
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:4740
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7540
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:6668
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:6352
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:7188
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:5148
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7316
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7916
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:2340
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\59466fuck.exe1⤵PID:6476
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe2⤵PID:6564
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"3⤵PID:1428
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"4⤵PID:7148
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7028
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1820
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7544
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:6216
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:1540
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:9136
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:7792
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3708
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:8264
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6464
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:1532
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:3748
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:8412
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:7680
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6172
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9100
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:764
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:208
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:4504
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:8540
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:904
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2864
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:8348
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:552
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:6700
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:8152
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:4540
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:4180
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4896
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:8860
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8504
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:1388
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:8164
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:8740
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:8520
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8484
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:4992
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8672
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:4704
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:7560
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:7624
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:8212
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8844
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9124
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8884
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:1004
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:4924
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:8300
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:8532
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8696
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6096
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5144
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1120
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:4908
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4940
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:5140
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6108
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5924
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5568
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\33422fuck.exe1⤵PID:6744
-
C:\Users\Admin\AppData\Roaming\33422fuck.exeC:\Users\Admin\AppData\Roaming\33422fuck.exe2⤵PID:212
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe"3⤵PID:7704
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe"4⤵PID:2688
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6616
-
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7080
-
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8368
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\31158fuck.exe1⤵PID:6728
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe2⤵PID:4220
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"3⤵PID:7448
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"4⤵PID:8508
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3716
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1700
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:816
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\45292fuck.exe1⤵PID:3184
-
C:\Users\Admin\AppData\Roaming\45292fuck.exeC:\Users\Admin\AppData\Roaming\45292fuck.exe2⤵PID:7252
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"3⤵PID:8380
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"4⤵PID:8856
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6168
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1508
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5688
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1000
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8896
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:6456
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:2696
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6744
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1036
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:9036
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:7228
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8960
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:6712
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:972
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:5416
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:8060
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:2244
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:7396
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:9032
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:2556
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:3216
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8328
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3676
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:3888
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\59466fuck.exe1⤵PID:7404
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe2⤵PID:8908
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"3⤵PID:4864
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"4⤵PID:8284
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7252
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7996
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4008
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:7484
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8828
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4688
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:3912
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8424
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7480
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4264
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:7636
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8836
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:4892
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:6192
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8824
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:4472
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6044
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:7612
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:8088
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:8752
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:4468
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6844
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5992
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:3568
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:7308
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8444
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:6812
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:820
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8892
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:3184
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4040
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\25756fuck.exe1⤵PID:1236
-
C:\Users\Admin\AppData\Roaming\25756fuck.exeC:\Users\Admin\AppData\Roaming\25756fuck.exe2⤵PID:1448
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe"3⤵PID:6212
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe"4⤵PID:7536
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4716
-
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:4316
-
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:5536
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\17198fuck.exe1⤵PID:5328
-
C:\Users\Admin\AppData\Roaming\17198fuck.exeC:\Users\Admin\AppData\Roaming\17198fuck.exe2⤵PID:8800
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe"3⤵PID:8960
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe"4⤵PID:8724
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8788
-
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6000
-
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:1360
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:8916
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:5268
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:3152
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:4712
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1000
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7176
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8140
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:7876
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:1068
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:4256
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:8920
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1408
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6564
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6904
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:6116
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:5200
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:7780
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:7776
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6312
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:2516
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6188
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:2608
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:8516
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:3504
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:9076
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8020
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1068
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7360
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\50475fuck.exe1⤵PID:6608
-
C:\Users\Admin\AppData\Roaming\50475fuck.exeC:\Users\Admin\AppData\Roaming\50475fuck.exe2⤵PID:8784
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"3⤵PID:5344
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"4⤵PID:5916
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:8452
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9060
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:1132
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\50475fuck.exe1⤵PID:4724
-
C:\Users\Admin\AppData\Roaming\50475fuck.exeC:\Users\Admin\AppData\Roaming\50475fuck.exe2⤵PID:7580
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"3⤵PID:8732
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe"4⤵PID:760
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4160
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7516
-
-
C:\Users\Admin\AppData\Roaming\50475fuck.exe"C:\Users\Admin\AppData\Roaming\50475fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7760
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:7896
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:6740
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:6420
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:4808
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2124
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6604
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4568
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:8196
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:1728
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:7712
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:9060
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6260
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7136
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7600
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:2432
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:4656
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"3⤵PID:7580
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe"4⤵PID:1196
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3236
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5404
-
-
C:\Users\Admin\AppData\Roaming\88803fuck.exe"C:\Users\Admin\AppData\Roaming\88803fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6292
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\12780fuck.exe1⤵PID:4012
-
C:\Users\Admin\AppData\Roaming\12780fuck.exeC:\Users\Admin\AppData\Roaming\12780fuck.exe2⤵PID:2868
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe"3⤵PID:9328
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe"4⤵PID:9516
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:9768
-
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9852
-
-
C:\Users\Admin\AppData\Roaming\12780fuck.exe"C:\Users\Admin\AppData\Roaming\12780fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:9988
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\33422fuck.exe1⤵PID:7452
-
C:\Users\Admin\AppData\Roaming\33422fuck.exeC:\Users\Admin\AppData\Roaming\33422fuck.exe2⤵PID:7956
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe"3⤵PID:7408
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe"4⤵PID:8168
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4540
-
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9264
-
-
C:\Users\Admin\AppData\Roaming\33422fuck.exe"C:\Users\Admin\AppData\Roaming\33422fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:9352
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:6772
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:9092
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:1800
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:9500
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:9668
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9868
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:10008
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\31158fuck.exe1⤵PID:8092
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe2⤵PID:9024
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"3⤵PID:9364
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe"4⤵PID:9488
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:9648
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9736
-
-
C:\Users\Admin\AppData\Roaming\31158fuck.exe"C:\Users\Admin\AppData\Roaming\31158fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:9832
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\45292fuck.exe1⤵PID:3748
-
C:\Users\Admin\AppData\Roaming\45292fuck.exeC:\Users\Admin\AppData\Roaming\45292fuck.exe2⤵PID:6916
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"3⤵PID:4940
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe"4⤵PID:9556
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:10032
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7124
-
-
C:\Users\Admin\AppData\Roaming\45292fuck.exe"C:\Users\Admin\AppData\Roaming\45292fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:9828
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:1004
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:4804
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:9280
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:9432
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:9024
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:6212
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:9636
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\44960fuck.exe1⤵PID:4920
-
C:\Users\Admin\AppData\Roaming\44960fuck.exeC:\Users\Admin\AppData\Roaming\44960fuck.exe2⤵PID:8276
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe"3⤵PID:9640
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe"4⤵PID:9772
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:3048
-
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:1752
-
-
C:\Users\Admin\AppData\Roaming\44960fuck.exe"C:\Users\Admin\AppData\Roaming\44960fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8240
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:8448
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8152
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:9976
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:6900
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:9816
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:5124
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:10024
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\59466fuck.exe1⤵PID:7672
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe2⤵PID:1724
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"3⤵PID:10052
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe"4⤵PID:7056
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:10012
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:10056
-
-
C:\Users\Admin\AppData\Roaming\59466fuck.exe"C:\Users\Admin\AppData\Roaming\59466fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7416
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:6196
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:7504
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:3940
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:3528
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:10228
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9760
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8428
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:7532
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:7396
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:9844
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:8216
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1172
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7396
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6064
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:8172
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:1172
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:9240
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:8856
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:1724
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:8096
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:4796
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:8680
-
C:\Users\Admin\AppData\Roaming\38100fuck.exeC:\Users\Admin\AppData\Roaming\38100fuck.exe2⤵PID:4320
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"3⤵PID:7796
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe"4⤵PID:9360
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:9192
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:2760
-
-
C:\Users\Admin\AppData\Roaming\38100fuck.exe"C:\Users\Admin\AppData\Roaming\38100fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8164
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\82402fuck.exe1⤵PID:6308
-
C:\Users\Admin\AppData\Roaming\82402fuck.exeC:\Users\Admin\AppData\Roaming\82402fuck.exe2⤵PID:3832
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"3⤵PID:8568
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"4⤵PID:9756
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:6400
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7640
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7896
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:1636
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8036
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"3⤵PID:7636
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe"4⤵PID:10236
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:4988
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7348
-
-
C:\Users\Admin\AppData\Roaming\15771fuck.exe"C:\Users\Admin\AppData\Roaming\15771fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7256
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\25756fuck.exe1⤵PID:5560
-
C:\Users\Admin\AppData\Roaming\25756fuck.exeC:\Users\Admin\AppData\Roaming\25756fuck.exe2⤵PID:7256
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe"3⤵PID:880
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe"4⤵PID:6860
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:10232
-
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:9836
-
-
C:\Users\Admin\AppData\Roaming\25756fuck.exe"C:\Users\Admin\AppData\Roaming\25756fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:6612
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\17198fuck.exe1⤵PID:6728
-
C:\Users\Admin\AppData\Roaming\17198fuck.exeC:\Users\Admin\AppData\Roaming\17198fuck.exe2⤵PID:8736
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe"3⤵PID:9944
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe"4⤵PID:6428
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:220
-
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7836
-
-
C:\Users\Admin\AppData\Roaming\17198fuck.exe"C:\Users\Admin\AppData\Roaming\17198fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8712
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\82402fuck.exe1⤵PID:7556
-
C:\Users\Admin\AppData\Roaming\82402fuck.exeC:\Users\Admin\AppData\Roaming\82402fuck.exe2⤵PID:2040
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"3⤵PID:10020
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe"4⤵PID:6204
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:2100
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:7668
-
-
C:\Users\Admin\AppData\Roaming\82402fuck.exe"C:\Users\Admin\AppData\Roaming\82402fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:7948
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:8780
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:6152
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"3⤵PID:6080
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe"4⤵PID:5268
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data.dmp5⤵PID:7920
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data1.dmp5⤵PID:4492
-
-
C:\Users\Admin\AppData\Roaming\24048fuck.exe"C:\Users\Admin\AppData\Roaming\24048fuck.exe" /scomma C:\Users\Admin\AppData\Local\Temp\data2.dmp5⤵PID:8352
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:8464
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:6672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:7880
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:5392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\68856fuck.exe1⤵PID:3044
-
C:\Users\Admin\AppData\Roaming\68856fuck.exeC:\Users\Admin\AppData\Roaming\68856fuck.exe2⤵PID:7392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\50475fuck.exe1⤵PID:9144
-
C:\Users\Admin\AppData\Roaming\50475fuck.exeC:\Users\Admin\AppData\Roaming\50475fuck.exe2⤵PID:5188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:5420
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:6120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\50475fuck.exe1⤵PID:2136
-
C:\Users\Admin\AppData\Roaming\50475fuck.exeC:\Users\Admin\AppData\Roaming\50475fuck.exe2⤵PID:9744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:8524
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:7172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\83230fuck.exe1⤵PID:2724
-
C:\Users\Admin\AppData\Roaming\83230fuck.exeC:\Users\Admin\AppData\Roaming\83230fuck.exe2⤵PID:6584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\88803fuck.exe1⤵PID:8516
-
C:\Users\Admin\AppData\Roaming\88803fuck.exeC:\Users\Admin\AppData\Roaming\88803fuck.exe2⤵PID:6484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:4280
-
C:\Users\Admin\AppData\Roaming\24048fuck.exeC:\Users\Admin\AppData\Roaming\24048fuck.exe2⤵PID:7616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\93059fuck.exe1⤵PID:3544
-
C:\Users\Admin\AppData\Roaming\93059fuck.exeC:\Users\Admin\AppData\Roaming\93059fuck.exe2⤵PID:8956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\33422fuck.exe1⤵PID:5848
-
C:\Users\Admin\AppData\Roaming\33422fuck.exeC:\Users\Admin\AppData\Roaming\33422fuck.exe2⤵PID:8488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:4192
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:8788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\12780fuck.exe1⤵PID:4300
-
C:\Users\Admin\AppData\Roaming\12780fuck.exeC:\Users\Admin\AppData\Roaming\12780fuck.exe2⤵PID:6452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\31158fuck.exe1⤵PID:6704
-
C:\Users\Admin\AppData\Roaming\31158fuck.exeC:\Users\Admin\AppData\Roaming\31158fuck.exe2⤵PID:9776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:9712
-
C:\Users\Admin\AppData\Roaming\15771fuck.exeC:\Users\Admin\AppData\Roaming\15771fuck.exe2⤵PID:6492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:10092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\45292fuck.exe1⤵PID:9348
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\44960fuck.exe1⤵PID:5324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\62884fuck.exe1⤵PID:9656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\59466fuck.exe1⤵PID:3348
-
C:\Users\Admin\AppData\Roaming\59466fuck.exeC:\Users\Admin\AppData\Roaming\59466fuck.exe2⤵PID:8528
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:9344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\38100fuck.exe1⤵PID:8004
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\92981fuck.exe1⤵PID:6800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:6820
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:8944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\82402fuck.exe1⤵PID:9108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\17198fuck.exe1⤵PID:7452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\82402fuck.exe1⤵PID:6980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\53180fuck.exe1⤵PID:8456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\25756fuck.exe1⤵PID:7528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\15771fuck.exe1⤵PID:9120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\24048fuck.exe1⤵PID:7800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\68856fuck.exe1⤵PID:4228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\58226fuck.exe1⤵PID:5200
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD598038b80a340be3f15d2e703c2a2a65d
SHA12b6800b43510660f590b35f68815831f2085ba77
SHA2567a1dd5945a69a7e9c82dbadd5e19b187c017891818ea5b445c6ced1132ec1b1e
SHA5125f6ace3aa4f5533c9eba9d89ffefce177bf6c3327d5766250a3f6cc232a1668fd426016c49ed67bff2b8ff2be8cc35a452c9d0bafdb5064a523e2d5adca4401a
-
Filesize
54B
MD5c10dbeca73f8835240e08e4511284b83
SHA10032f8f941cc07768189ca6ba32b1beede6b6917
SHA2560b6b62094048f0a069b4582f837afcb941db51340d0b16d578e8cbe8603a071e
SHA51234f7ab8b4ab7b4996b82ffc49198103ef245ee7dd5ccfec793a9ee391b9e9bb30bd3916b4ebeaa9c66a4b5ca42f8572418f16dc83d41073bc94389c19916b967
-
Filesize
799KB
MD5b655138dd238886d3a6f88233d13d5d1
SHA1502115893c1bbf3acf6c3cb98feb8404a24308ac
SHA256bb1706071ec13fcd19d0d65274414760565b896f62ac17bf61546774ad0a7d93
SHA5125d2656321005f609652b8903513bed9cc6a9057497231c364a85f34ed508f812f463d311912d1a48c54615eda3f13dc646989a182fbf09f64a4bc8d6c16c983f
-
Filesize
170B
MD50a8f86ce19de5f03effc01fbb7214b48
SHA13e8bcdd9cf19eea57fefd48d122f44823038feb0
SHA2569130d70553854ea49578212accfaf32b8b8c5149fae845ebade41f1c2a22ba68
SHA5128d2f5dee151a41f8cfa7608a83eaf97e7854a4cfb9a49126386f1c0005db038324c800abff309438a65703c179a4bd0a900b7499d973667a09da2cce175ee747