Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240611-en
General
-
Target
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe
-
Size
353KB
-
MD5
7fb6a8bbcc54cc1619ffd51aa9818fd6
-
SHA1
1bce717878bbc4e5638ca3fcc8179addd64a77fb
-
SHA256
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b
-
SHA512
9f3a56a2d642b940d01438783604c374017e9a94114a4298e957c047ca3ddbdccd5d360e5003a5f6b588e8429f5938081a338470d9a2981216b9870aeffb1032
-
SSDEEP
6144:ZsKxNX1AZr4pmt/DjcT3VMgEWM9Ks1i6bgQz8N6IjXjuPD:JWZr4pmtbjcT3ygK/11bR8NVoD
Malware Config
Signatures
-
Loads dropped DLL 64 IoCs
Processes:
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exepid process 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 15 drive.google.com 11 drive.google.com 12 drive.google.com 13 drive.google.com 14 drive.google.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exeb187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exepid process 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe 4556 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exedescription pid process target process PID 1816 set thread context of 4556 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe -
Drops file in Windows directory 1 IoCs
Processes:
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exedescription ioc process File opened for modification C:\Windows\resources\frontalangrebs\appetizer.ini b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exepid process 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exedescription pid process target process PID 1816 wrote to memory of 4688 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4688 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4688 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4128 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4128 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4128 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4820 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4820 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4820 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2208 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2208 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2208 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 3628 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 3628 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 3628 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1612 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1612 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1612 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2708 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2708 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2708 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1836 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1836 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1836 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2632 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2632 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2632 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4368 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4368 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4368 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 912 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 912 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 912 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4196 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4196 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4196 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 5112 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 5112 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 5112 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2816 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2816 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2816 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 748 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 748 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 748 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1692 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1692 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1692 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2644 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2644 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2644 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4884 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4884 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4884 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 3412 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 3412 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 3412 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4816 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4816 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 4816 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1256 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1256 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 1256 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe PID 1816 wrote to memory of 2328 1816 b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe"C:\Users\Admin\AppData\Local\Temp\b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "242^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "247^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "240^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "220^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "193^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "231^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "196^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "240^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "210^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "135^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "201^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "193^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "226^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "247^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "225^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "223^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "197^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "135^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "134^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "134^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "250^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "255^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "244^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "253^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "227^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "213^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "247^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "132^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "137^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "135^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "133^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "155^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "159^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "196^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "194^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "212^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "130^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "131^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "139^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "242^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "208^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "221^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "230^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "223^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "213^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "198^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "225^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "222^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "210^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "240^177"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "153^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "195^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "128^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "157^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "216^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "145^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "129^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "152^177"2⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c set /a "141^177"2⤵
-
C:\Users\Admin\AppData\Local\Temp\b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe"C:\Users\Admin\AppData\Local\Temp\b187478ed3f00d2157b587ff89b0241c3db74e50370bb3b5e25aac165a09891b.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsx4D94.tmp\System.dllFilesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
C:\Users\Admin\AppData\Local\Temp\nsx4D94.tmp\nsExec.dllFilesize
6KB
MD58d4278d0b0af44c989ed14ea40b75e06
SHA1072f92761b281bc20d0bc3b3486251f60e6c259f
SHA2569c50ba10ff8009137ad005aee7bdcace042ff343b37e11cd6ca45a6186ae977e
SHA5121a22c3aa8ea1ff980b5c7812f75a9369cfd74f2b780039e79c0c52eb00cb019bac6f860e97a7279f0c8e4c890e5dd1bca31e69d6548fc73397d4fa05c8b12542
-
memory/1816-1260-0x0000000010004000-0x0000000010005000-memory.dmpFilesize
4KB
-
memory/4556-1261-0x0000000000400000-0x0000000001654000-memory.dmpFilesize
18.3MB
-
memory/4556-1262-0x0000000000400000-0x0000000001654000-memory.dmpFilesize
18.3MB