Overview
overview
10Static
static
10TrashMalwa...in.exe
windows10-2004-x64
8TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...nk.exe
windows10-2004-x64
8TrashMalwa...oN.bat
windows10-2004-x64
8TrashMalwa...zz.exe
windows10-2004-x64
6TrashMalwa...de.exe
windows10-2004-x64
8TrashMalwa...20.exe
windows10-2004-x64
7TrashMalwa...ll.exe
windows10-2004-x64
8TrashMalwa...le.exe
windows10-2004-x64
8TrashMalwa...oe.bat
windows10-2004-x64
TrashMalwa....0.exe
windows10-2004-x64
7TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa....0.exe
windows10-2004-x64
8TrashMalwa...ic.exe
windows10-2004-x64
6TrashMalwa...OD.exe
windows10-2004-x64
10TrashMalwa...um.exe
windows10-2004-x64
6TrashMalwa...er.exe
windows10-2004-x64
8TrashMalwa...MZ.exe
windows10-2004-x64
1TrashMalwa...ch.exe
windows10-2004-x64
8TrashMalwa....5.exe
windows10-2004-x64
8TrashMalwa...ol.exe
windows10-2004-x64
8TrashMalwa...hm.exe
windows10-2004-x64
10TrashMalwa...10.exe
windows10-2004-x64
7TrashMalwa...V6.exe
windows10-2004-x64
7TrashMalwa.../x.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 14:13
Behavioral task
behavioral1
Sample
TrashMalwares-main/AcidRain.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
TrashMalwares-main/Antivirus_Installer.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
TrashMalwares-main/Dro trojan. Virus prank.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
TrashMalwares-main/FaZoN.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
TrashMalwares-main/Fizz.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
TrashMalwares-main/Ginxide.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
TrashMalwares-main/Install Windows20.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
TrashMalwares-main/MS-RickRoll.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
TrashMalwares-main/MercuryXhoffle.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
TrashMalwares-main/NetPakoe.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
TrashMalwares-main/NetPakoe3.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
TrashMalwares-main/NoEscape8.0.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
TrashMalwares-main/PC shaking v4.0.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
TrashMalwares-main/Phsyletric.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
TrashMalwares-main/RealBSOD.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
TrashMalwares-main/Sankylium.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
TrashMalwares-main/SuperWacker.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral18
Sample
TrashMalwares-main/TEMZ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
TrashMalwares-main/ach.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral20
Sample
TrashMalwares-main/even0.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
TrashMalwares-main/lol.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
TrashMalwares-main/mhm.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
TrashMalwares-main/winnit6.6.6 V10.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral24
Sample
TrashMalwares-main/winnit6.6.6_V6.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
TrashMalwares-main/x.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
TrashMalwares-main/NetPakoe.bat
-
Size
635B
-
MD5
6c5a9741a170d3ac2e2c89d3e91ea6ea
-
SHA1
7034266eefee8c6437d966f5d91ea82e50e10d59
-
SHA256
4d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
-
SHA512
9dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 23 IoCs
Processes:
explorer.exetaskkill.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.execmd.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeConhost.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components taskkill.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components Conhost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 64 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.bat cmd.exe -
Enumerates connected drives 3 TTPs 7 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\D: explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 8856 64 WerFault.exe 7356 9640 WerFault.exe cmd.exe 13228 13000 WerFault.exe 13020 6772 WerFault.exe cmd.exe 13028 12536 WerFault.exe 7880 12460 WerFault.exe dwm.exe 5284 3832 WerFault.exe cmd.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
dwm.exedwm.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
dwm.exedwm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Kills process with taskkill 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 11572 taskkill.exe 8104 taskkill.exe 8572 taskkill.exe 10380 taskkill.exe 11980 taskkill.exe 12104 taskkill.exe 11244 taskkill.exe 7368 taskkill.exe 6772 taskkill.exe 7868 taskkill.exe 8220 taskkill.exe 10352 taskkill.exe 10632 taskkill.exe 6304 taskkill.exe 7240 taskkill.exe 11532 taskkill.exe 7408 taskkill.exe 6756 taskkill.exe 4920 taskkill.exe 6300 taskkill.exe 5648 taskkill.exe 7080 taskkill.exe 7512 taskkill.exe 8132 taskkill.exe 8420 taskkill.exe 10932 taskkill.exe 6188 taskkill.exe 9240 taskkill.exe 10452 taskkill.exe 8360 taskkill.exe 10388 taskkill.exe 9308 taskkill.exe 10640 taskkill.exe 5312 taskkill.exe 8284 taskkill.exe 10140 taskkill.exe 2316 taskkill.exe 10440 taskkill.exe 6108 taskkill.exe 1684 taskkill.exe 2536 taskkill.exe 6768 taskkill.exe 8404 taskkill.exe 11812 taskkill.exe 10964 taskkill.exe 10584 taskkill.exe 7252 taskkill.exe 5136 taskkill.exe 11476 taskkill.exe 11944 taskkill.exe 10360 taskkill.exe 8676 taskkill.exe 2692 taskkill.exe 6404 taskkill.exe 7832 taskkill.exe 10612 taskkill.exe 10444 taskkill.exe 7128 taskkill.exe 2128 taskkill.exe 8464 taskkill.exe 2212 taskkill.exe 3268 taskkill.exe 5864 taskkill.exe 1256 taskkill.exe -
Modifies data under HKEY_USERS 36 IoCs
Processes:
dwm.exedwm.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe -
Modifies registry class 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.execmd.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{8A367D91-CBF6-4329-AE24-ED2ABB958B6F} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{A3988848-604F-4626-96E1-AEA39194E675} explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{78AFF901-9FF4-4525-B18D-99370946EF7D} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{2674D955-9B48-49CF-97E4-96E14F3D14BF} explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{4E8FFEF8-1F58-463C-8B03-8D1F2C685C56} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{35570209-C2BD-44FA-9322-650A1E3A7E6E} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{7187A0E8-FE8E-4983-AE77-15759B035C95} explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{65A57B18-B157-46DA-ACF7-CC2A14528A5D} cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{8E369A29-EA23-43A8-B65F-DBD43CE31264} explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{2D5B39BE-B1DC-4128-B3EB-0E33A435A689} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{558C85AD-B57C-4B40-96F6-9B110035E1B7} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{6691B836-77D4-4654-BB88-4DC17E14B369} explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{98FBE856-CAEB-47E8-924D-180A15200868} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{A4E00649-F404-45D8-83CE-B5A5FC95ED3A} explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{233A4BFA-423A-4334-A0D7-779A61ADD8C2} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: LoadsDriver 64 IoCs
Processes:
pid process 3352 3912 4028 11128 1820 2480 11808 12240 9496 11864 11868 11940 11924 9852 7856 12012 12092 5280 9832 2296 7472 2256 9856 3776 7508 4072 11220 5224 404 7880 4048 3744 1432 936 12196 9892 2708 4824 1960 5492 4452 3956 3368 8772 3936 5740 3256 5124 4920 8864 5936 5312 3748 12828 10132 5536 8868 5008 4120 5284 5360 10004 5732 12232 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exeexplorer.exetaskkill.exetaskkill.exeexplorer.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeexplorer.exetaskkill.exetaskkill.exetaskkill.exeConhost.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeConhost.exeexplorer.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4964 taskkill.exe Token: SeShutdownPrivilege 5112 explorer.exe Token: SeCreatePagefilePrivilege 5112 explorer.exe Token: SeShutdownPrivilege 5112 explorer.exe Token: SeCreatePagefilePrivilege 5112 explorer.exe Token: SeShutdownPrivilege 5112 explorer.exe Token: SeCreatePagefilePrivilege 5112 explorer.exe Token: SeShutdownPrivilege 5112 explorer.exe Token: SeCreatePagefilePrivilege 5112 explorer.exe Token: SeDebugPrivilege 2708 taskkill.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeShutdownPrivilege 5112 explorer.exe Token: SeCreatePagefilePrivilege 5112 explorer.exe Token: SeShutdownPrivilege 3504 explorer.exe Token: SeCreatePagefilePrivilege 3504 explorer.exe Token: SeShutdownPrivilege 3504 explorer.exe Token: SeCreatePagefilePrivilege 3504 explorer.exe Token: SeShutdownPrivilege 3504 explorer.exe Token: SeCreatePagefilePrivilege 3504 explorer.exe Token: SeShutdownPrivilege 3504 explorer.exe Token: SeCreatePagefilePrivilege 3504 explorer.exe Token: SeShutdownPrivilege 3504 explorer.exe Token: SeCreatePagefilePrivilege 3504 explorer.exe Token: SeDebugPrivilege 4448 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 4264 taskkill.exe Token: SeDebugPrivilege 4888 taskkill.exe Token: SeShutdownPrivilege 1808 explorer.exe Token: SeCreatePagefilePrivilege 1808 explorer.exe Token: SeShutdownPrivilege 1808 explorer.exe Token: SeCreatePagefilePrivilege 1808 explorer.exe Token: SeShutdownPrivilege 1808 explorer.exe Token: SeCreatePagefilePrivilege 1808 explorer.exe Token: SeShutdownPrivilege 1808 explorer.exe Token: SeCreatePagefilePrivilege 1808 explorer.exe Token: SeDebugPrivilege 3544 taskkill.exe Token: SeShutdownPrivilege 1808 explorer.exe Token: SeCreatePagefilePrivilege 1808 explorer.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 4544 taskkill.exe Token: SeShutdownPrivilege 208 Conhost.exe Token: SeCreatePagefilePrivilege 208 Conhost.exe Token: SeShutdownPrivilege 208 Conhost.exe Token: SeCreatePagefilePrivilege 208 Conhost.exe Token: SeDebugPrivilege 448 taskkill.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 2600 taskkill.exe Token: SeDebugPrivilege 4332 taskkill.exe Token: SeDebugPrivilege 2536 Conhost.exe Token: SeShutdownPrivilege 4112 explorer.exe Token: SeCreatePagefilePrivilege 4112 explorer.exe Token: SeShutdownPrivilege 4112 explorer.exe Token: SeCreatePagefilePrivilege 4112 explorer.exe Token: SeShutdownPrivilege 4112 explorer.exe Token: SeCreatePagefilePrivilege 4112 explorer.exe Token: SeShutdownPrivilege 4112 explorer.exe Token: SeCreatePagefilePrivilege 4112 explorer.exe Token: SeShutdownPrivilege 4112 explorer.exe Token: SeCreatePagefilePrivilege 4112 explorer.exe Token: SeDebugPrivilege 3304 taskkill.exe Token: SeShutdownPrivilege 4112 explorer.exe Token: SeCreatePagefilePrivilege 4112 explorer.exe Token: SeDebugPrivilege 4372 taskkill.exe Token: SeDebugPrivilege 2684 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.execmd.exeexplorer.exepid process 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 6288 explorer.exe 6288 explorer.exe 6288 explorer.exe 6288 explorer.exe 6288 explorer.exe 6288 explorer.exe 6832 explorer.exe 6832 explorer.exe 6832 explorer.exe 6832 explorer.exe 6832 explorer.exe 6832 explorer.exe 6912 cmd.exe 6912 cmd.exe 6912 cmd.exe 6912 cmd.exe 6912 cmd.exe 6912 cmd.exe 7896 explorer.exe 7896 explorer.exe 7896 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 5112 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 3504 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 1808 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 4112 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5508 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 5920 explorer.exe 6288 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4752 wrote to memory of 2640 4752 cmd.exe taskkill.exe PID 4752 wrote to memory of 2640 4752 cmd.exe taskkill.exe PID 4752 wrote to memory of 4964 4752 cmd.exe taskkill.exe PID 4752 wrote to memory of 4964 4752 cmd.exe taskkill.exe PID 4752 wrote to memory of 4604 4752 cmd.exe cmd.exe PID 4752 wrote to memory of 4604 4752 cmd.exe cmd.exe PID 4752 wrote to memory of 4596 4752 cmd.exe cmd.exe PID 4752 wrote to memory of 4596 4752 cmd.exe cmd.exe PID 4752 wrote to memory of 5112 4752 cmd.exe explorer.exe PID 4752 wrote to memory of 5112 4752 cmd.exe explorer.exe PID 4596 wrote to memory of 4664 4596 cmd.exe taskkill.exe PID 4596 wrote to memory of 4664 4596 cmd.exe taskkill.exe PID 4604 wrote to memory of 4624 4604 cmd.exe taskkill.exe PID 4604 wrote to memory of 4624 4604 cmd.exe taskkill.exe PID 4596 wrote to memory of 2708 4596 cmd.exe taskkill.exe PID 4596 wrote to memory of 2708 4596 cmd.exe taskkill.exe PID 4604 wrote to memory of 2380 4604 cmd.exe taskkill.exe PID 4604 wrote to memory of 2380 4604 cmd.exe taskkill.exe PID 4604 wrote to memory of 4276 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 4276 4604 cmd.exe cmd.exe PID 4596 wrote to memory of 4136 4596 cmd.exe cmd.exe PID 4596 wrote to memory of 4136 4596 cmd.exe cmd.exe PID 4604 wrote to memory of 4312 4604 cmd.exe cmd.exe PID 4604 wrote to memory of 4312 4604 cmd.exe cmd.exe PID 4596 wrote to memory of 4420 4596 cmd.exe cmd.exe PID 4596 wrote to memory of 4420 4596 cmd.exe cmd.exe PID 4604 wrote to memory of 3504 4604 cmd.exe explorer.exe PID 4604 wrote to memory of 3504 4604 cmd.exe explorer.exe PID 4596 wrote to memory of 3380 4596 cmd.exe explorer.exe PID 4596 wrote to memory of 3380 4596 cmd.exe explorer.exe PID 4420 wrote to memory of 1496 4420 cmd.exe taskkill.exe PID 4420 wrote to memory of 1496 4420 cmd.exe taskkill.exe PID 4276 wrote to memory of 2600 4276 cmd.exe taskkill.exe PID 4276 wrote to memory of 2600 4276 cmd.exe taskkill.exe PID 4136 wrote to memory of 2536 4136 cmd.exe Conhost.exe PID 4136 wrote to memory of 2536 4136 cmd.exe Conhost.exe PID 4312 wrote to memory of 2456 4312 cmd.exe taskkill.exe PID 4312 wrote to memory of 2456 4312 cmd.exe taskkill.exe PID 4420 wrote to memory of 4448 4420 cmd.exe taskkill.exe PID 4420 wrote to memory of 4448 4420 cmd.exe taskkill.exe PID 4276 wrote to memory of 1256 4276 cmd.exe taskkill.exe PID 4276 wrote to memory of 1256 4276 cmd.exe taskkill.exe PID 4136 wrote to memory of 4264 4136 cmd.exe taskkill.exe PID 4136 wrote to memory of 4264 4136 cmd.exe taskkill.exe PID 4312 wrote to memory of 4888 4312 cmd.exe taskkill.exe PID 4312 wrote to memory of 4888 4312 cmd.exe taskkill.exe PID 4420 wrote to memory of 4316 4420 cmd.exe cmd.exe PID 4420 wrote to memory of 4316 4420 cmd.exe cmd.exe PID 4420 wrote to memory of 1112 4420 cmd.exe cmd.exe PID 4420 wrote to memory of 1112 4420 cmd.exe cmd.exe PID 4420 wrote to memory of 1808 4420 cmd.exe explorer.exe PID 4420 wrote to memory of 1808 4420 cmd.exe explorer.exe PID 4276 wrote to memory of 4240 4276 cmd.exe cmd.exe PID 4276 wrote to memory of 4240 4276 cmd.exe cmd.exe PID 4276 wrote to memory of 2360 4276 cmd.exe cmd.exe PID 4276 wrote to memory of 2360 4276 cmd.exe cmd.exe PID 4276 wrote to memory of 640 4276 cmd.exe explorer.exe PID 4276 wrote to memory of 640 4276 cmd.exe explorer.exe PID 1112 wrote to memory of 1048 1112 cmd.exe taskkill.exe PID 1112 wrote to memory of 1048 1112 cmd.exe taskkill.exe PID 4316 wrote to memory of 3040 4316 cmd.exe taskkill.exe PID 4316 wrote to memory of 3040 4316 cmd.exe taskkill.exe PID 4240 wrote to memory of 3472 4240 cmd.exe taskkill.exe PID 4240 wrote to memory of 3472 4240 cmd.exe taskkill.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TrashMalwares-main\NetPakoe.bat"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F2⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer2⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F3⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F4⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM Taskmgr.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6772 -s 5768⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\explorer.exeexplorer8⤵
- Modifies Installed Components in the registry
- Modifies registry class
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 9640 -s 5608⤵
- Program crash
-
C:\Windows\explorer.exeexplorer7⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
- Modifies Installed Components in the registry
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe4⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
- Modifies Installed Components in the registry
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F10⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F10⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F10⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM Taskmgr.exe /F10⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F10⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F10⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\explorer.exeexplorer6⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
-
C:\Windows\explorer.exeexplorer4⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F4⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat4⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer.exe9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer6⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe4⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer.exe9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
- Drops startup file
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
-
C:\Windows\explorer.exeexplorer4⤵
-
C:\Windows\explorer.exeexplorer3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F3⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F4⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F10⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3832 -s 54010⤵
- Program crash
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\explorer.exeexplorer9⤵
- Modifies Installed Components in the registry
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\explorer.exeexplorer10⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 608⤵
-
C:\Windows\explorer.exeexplorer.exe8⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
- Modifies Installed Components in the registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 608⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe4⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 608⤵
-
C:\Windows\explorer.exeexplorer.exe8⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer.exe9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
- Modifies Installed Components in the registry
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer.exe9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat9⤵
-
C:\Windows\explorer.exeexplorer9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F9⤵
- Modifies Installed Components in the registry
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F9⤵
-
C:\Windows\explorer.exeexplorer8⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\explorer.exeexplorer5⤵
-
C:\Windows\explorer.exeexplorer4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F4⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat4⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe4⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F5⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
- Drops startup file
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe5⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 609⤵
-
C:\Windows\explorer.exeexplorer.exe9⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F9⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\explorer.exeexplorer7⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe6⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F7⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat7⤵
- Drops startup file
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe7⤵
-
C:\Windows\system32\taskkill.exetaskkill /im Task Manager.exe /F8⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /im explorer.exe /F8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe8⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K NetPakoe.bat8⤵
-
C:\Windows\explorer.exeexplorer8⤵
-
C:\Windows\system32\shutdown.exeshutdown -s -t 608⤵
-
C:\Windows\explorer.exeexplorer.exe8⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F8⤵
-
C:\Windows\system32\taskkill.exeTaskkill /IM csrss.exe /F8⤵
-
C:\Windows\explorer.exeexplorer7⤵
-
C:\Windows\explorer.exeexplorer6⤵
-
C:\Windows\explorer.exeexplorer5⤵
- Modifies Installed Components in the registry
- Modifies registry class
-
C:\Windows\explorer.exeexplorer4⤵
-
C:\Windows\explorer.exeexplorer3⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 444 -p 64 -ip 641⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 64 -s 47281⤵
- Program crash
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 8508 -ip 85081⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 13000 -s 2921⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 12536 -s 4001⤵
- Program crash
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 12460 -s 64362⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 552 -p 12460 -ip 124601⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 188 -p 11172 -ip 111721⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 3832 -ip 38321⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetPakoe.batFilesize
635B
MD56c5a9741a170d3ac2e2c89d3e91ea6ea
SHA17034266eefee8c6437d966f5d91ea82e50e10d59
SHA2564d1a5d2255194f08a772aef2363514890ecd620dfc49e5b701fc8f2e2388e616
SHA5129dcf12e971da1c78d92dd7ff824d50e8487ae61bfb9dcbfea6c38f8ebba22994fde19d825e44f4632aba9e0fc34d75cd87e090b75ed78b51b908128cc22ce29c
-
memory/8-183-0x0000000000000000-mapping.dmp
-
memory/208-182-0x0000000000000000-mapping.dmp
-
memory/448-184-0x0000000000000000-mapping.dmp
-
memory/640-166-0x0000000000000000-mapping.dmp
-
memory/936-190-0x0000000000000000-mapping.dmp
-
memory/1048-168-0x0000000000000000-mapping.dmp
-
memory/1112-162-0x0000000000000000-mapping.dmp
-
memory/1256-158-0x0000000000000000-mapping.dmp
-
memory/1292-175-0x0000000000000000-mapping.dmp
-
memory/1304-210-0x0000000000000000-mapping.dmp
-
memory/1496-193-0x0000000000000000-mapping.dmp
-
memory/1496-150-0x0000000000000000-mapping.dmp
-
memory/1508-201-0x0000000000000000-mapping.dmp
-
memory/1568-181-0x0000000000000000-mapping.dmp
-
memory/1808-163-0x0000000000000000-mapping.dmp
-
memory/1836-192-0x0000000000000000-mapping.dmp
-
memory/2128-177-0x0000000000000000-mapping.dmp
-
memory/2360-165-0x0000000000000000-mapping.dmp
-
memory/2380-142-0x0000000000000000-mapping.dmp
-
memory/2456-156-0x0000000000000000-mapping.dmp
-
memory/2536-154-0x0000000000000000-mapping.dmp
-
memory/2536-196-0x0000000000000000-mapping.dmp
-
memory/2556-179-0x0000000000000000-mapping.dmp
-
memory/2600-152-0x0000000000000000-mapping.dmp
-
memory/2600-195-0x0000000000000000-mapping.dmp
-
memory/2640-132-0x0000000000000000-mapping.dmp
-
memory/2640-178-0x0000000000000000-mapping.dmp
-
memory/2708-189-0x0000000000000000-mapping.dmp
-
memory/2708-141-0x0000000000000000-mapping.dmp
-
memory/3040-170-0x0000000000000000-mapping.dmp
-
memory/3240-203-0x0000000000000000-mapping.dmp
-
memory/3380-148-0x0000000000000000-mapping.dmp
-
memory/3472-172-0x0000000000000000-mapping.dmp
-
memory/3504-147-0x0000000000000000-mapping.dmp
-
memory/3544-174-0x0000000000000000-mapping.dmp
-
memory/3952-176-0x0000000000000000-mapping.dmp
-
memory/4024-197-0x0000000000000000-mapping.dmp
-
memory/4112-204-0x0000000000000000-mapping.dmp
-
memory/4136-144-0x0000000000000000-mapping.dmp
-
memory/4184-187-0x0000000000000000-mapping.dmp
-
memory/4240-164-0x0000000000000000-mapping.dmp
-
memory/4264-159-0x0000000000000000-mapping.dmp
-
memory/4276-143-0x0000000000000000-mapping.dmp
-
memory/4280-206-0x0000000000000000-mapping.dmp
-
memory/4312-145-0x0000000000000000-mapping.dmp
-
memory/4316-161-0x0000000000000000-mapping.dmp
-
memory/4332-194-0x0000000000000000-mapping.dmp
-
memory/4416-200-0x0000000000000000-mapping.dmp
-
memory/4420-146-0x0000000000000000-mapping.dmp
-
memory/4448-157-0x0000000000000000-mapping.dmp
-
memory/4544-180-0x0000000000000000-mapping.dmp
-
memory/4596-135-0x0000000000000000-mapping.dmp
-
memory/4604-134-0x0000000000000000-mapping.dmp
-
memory/4624-140-0x0000000000000000-mapping.dmp
-
memory/4664-138-0x0000000000000000-mapping.dmp
-
memory/4692-198-0x0000000000000000-mapping.dmp
-
memory/4700-207-0x0000000000000000-mapping.dmp
-
memory/4764-208-0x0000000000000000-mapping.dmp
-
memory/4832-211-0x0000000000000000-mapping.dmp
-
memory/4888-160-0x0000000000000000-mapping.dmp
-
memory/4920-199-0x0000000000000000-mapping.dmp
-
memory/4964-133-0x0000000000000000-mapping.dmp
-
memory/4988-202-0x0000000000000000-mapping.dmp
-
memory/5112-136-0x0000000000000000-mapping.dmp