Analysis
-
max time kernel
865s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
minecraft.jar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
minecraft.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
start.exe
Resource
win7-20240221-en
General
-
Target
start.exe
-
Size
192KB
-
MD5
066f7f594bf6f254748bc19562dd1bc3
-
SHA1
313883f4a7fbfc3c60b153492aeefb927c5d5694
-
SHA256
9398c6385a5246fe4b86b0f247ddb8a93a9c326389dabef1b96bd65af09b360e
-
SHA512
04f0c82938dee7a790876ab39282c36eda0c6de11a337d93f728c07be6ff5997605c6a9bba886b94091c313795ee19bf96d65ca9ac1e1d62eeab7acd33b6afca
-
SSDEEP
6144:i0mlbUZ0lzEhoPkoaHOw4D/dB8H2HSZRw5:0aCESPkpHNi/bX
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral4/files/0x000400000001e980-4.dat family_umbral behavioral4/memory/3260-13-0x00000233854F0000-0x0000023385530000-memory.dmp family_umbral -
Blocklisted process makes network request 13 IoCs
flow pid Process 328 2440 Process not Found 708 4660 Process not Found 710 4660 Process not Found 712 4660 Process not Found 726 4016 Process not Found 728 4016 Process not Found 730 4016 Process not Found 749 3816 Process not Found 751 3816 Process not Found 753 3816 Process not Found 785 4660 Process not Found 787 4660 Process not Found 789 4660 Process not Found -
Drops file in Drivers directory 49 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts NursultanStart.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts NursultanStart.exe File opened for modification C:\Windows\System32\drivers\etc\hosts NursultanStart.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts NursultanStart.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\System32\drivers\etc\hosts Process not Found -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Process not Found -
Executes dropped EXE 64 IoCs
pid Process 3260 NursultanStart.exe 2176 start.exe 4988 NursultanStart.exe 4152 start.exe 2668 NursultanStart.exe 5072 start.exe 4252 NursultanStart.exe 760 start.exe 4452 NursultanStart.exe 1632 start.exe 2032 NursultanStart.exe 4804 start.exe 4960 NursultanStart.exe 3936 start.exe 1908 NursultanStart.exe 972 start.exe 3920 NursultanStart.exe 2704 start.exe 384 NursultanStart.exe 2800 start.exe 4768 NursultanStart.exe 4516 start.exe 2964 NursultanStart.exe 2668 start.exe 4328 NursultanStart.exe 4012 start.exe 876 NursultanStart.exe 3784 start.exe 3948 NursultanStart.exe 2600 start.exe 2420 NursultanStart.exe 4468 start.exe 1844 NursultanStart.exe 2680 start.exe 4308 NursultanStart.exe 4600 start.exe 4704 NursultanStart.exe 1264 start.exe 2352 NursultanStart.exe 3600 start.exe 1612 NursultanStart.exe 2496 start.exe 3424 NursultanStart.exe 1596 start.exe 1964 NursultanStart.exe 2968 start.exe 2656 NursultanStart.exe 4720 start.exe 2676 NursultanStart.exe 2680 start.exe 4684 start.exe 5040 NursultanStart.exe 4288 NursultanStart.exe 1796 start.exe 1984 NursultanStart.exe 5024 start.exe 2652 NursultanStart.exe 1232 start.exe 2724 NursultanStart.exe 2512 start.exe 3776 NursultanStart.exe 2464 start.exe 4064 NursultanStart.exe 4052 start.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 3 discord.com 364 discord.com 795 discord.com 711 discord.com 741 discord.com 84 discord.com 270 discord.com 284 discord.com 759 discord.com 794 discord.com 47 discord.com 647 discord.com 626 discord.com 670 discord.com 264 discord.com 402 discord.com 611 discord.com 705 discord.com 374 discord.com 487 discord.com 507 discord.com 789 discord.com 159 discord.com 585 discord.com 627 discord.com 663 discord.com 664 discord.com 729 discord.com 752 discord.com 782 discord.com 490 discord.com 344 discord.com 463 discord.com 649 discord.com 688 discord.com 46 discord.com 681 discord.com 758 discord.com 825 discord.com 132 discord.com 735 discord.com 771 discord.com 657 discord.com 693 discord.com 712 discord.com 753 discord.com 813 discord.com 86 discord.com 464 discord.com 718 discord.com 562 discord.com 563 discord.com 682 discord.com 788 discord.com 180 discord.com 765 discord.com 770 discord.com 531 discord.com 783 discord.com 306 discord.com 687 discord.com 777 discord.com 330 discord.com 801 discord.com -
Looks up external IP address via web service 53 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 ip-api.com 358 ip-api.com 482 ip-api.com 400 ip-api.com 804 ip-api.com 703 ip-api.com 756 ip-api.com 810 ip-api.com 230 ip-api.com 259 ip-api.com 525 ip-api.com 121 ip-api.com 153 ip-api.com 336 ip-api.com 715 ip-api.com 792 ip-api.com 673 ip-api.com 822 ip-api.com 77 ip-api.com 300 ip-api.com 744 ip-api.com 762 ip-api.com 816 ip-api.com 661 ip-api.com 667 ip-api.com 685 ip-api.com 622 ip-api.com 641 ip-api.com 697 ip-api.com 733 ip-api.com 279 ip-api.com 459 ip-api.com 554 ip-api.com 503 ip-api.com 580 ip-api.com 721 ip-api.com 327 ip-api.com 655 ip-api.com 679 ip-api.com 709 ip-api.com 750 ip-api.com 786 ip-api.com 176 ip-api.com 727 ip-api.com 691 ip-api.com 739 ip-api.com 370 ip-api.com 447 ip-api.com 602 ip-api.com 798 ip-api.com 768 ip-api.com 774 ip-api.com 780 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 53 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3712 Process not Found 4360 Process not Found 2040 Process not Found 1348 Process not Found 2136 Process not Found 5092 Process not Found 1500 wmic.exe 4520 Process not Found 1948 Process not Found 1540 Process not Found 2804 Process not Found 2404 Process not Found 4960 Process not Found 3620 Process not Found 468 Process not Found 4620 Process not Found 4740 Process not Found 736 Process not Found 4492 wmic.exe 2708 wmic.exe 4268 Process not Found 3140 Process not Found 2396 Process not Found 4056 Process not Found 2404 Process not Found 4348 Process not Found 672 Process not Found 4548 Process not Found 4256 Process not Found 3240 Process not Found 980 Process not Found 1964 Process not Found 1000 Process not Found 4776 Process not Found 4656 Process not Found 3384 Process not Found 2584 Process not Found 2884 Process not Found 4912 Process not Found 3716 Process not Found 3156 Process not Found 4832 Process not Found 2692 Process not Found 4476 Process not Found 2916 Process not Found 3928 Process not Found 1448 wmic.exe 4204 Process not Found 3608 Process not Found 5052 Process not Found 2368 Process not Found 2188 Process not Found 4252 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 920 powershell.exe 920 powershell.exe 872 powershell.exe 872 powershell.exe 560 powershell.exe 560 powershell.exe 560 powershell.exe 2980 powershell.exe 2980 powershell.exe 2980 powershell.exe 4656 powershell.exe 4656 powershell.exe 4656 powershell.exe 4268 powershell.exe 4268 powershell.exe 4268 powershell.exe 3016 powershell.exe 3016 powershell.exe 3016 powershell.exe 3392 powershell.exe 3392 powershell.exe 3392 powershell.exe 4812 powershell.exe 4812 powershell.exe 4812 powershell.exe 4924 powershell.exe 4924 powershell.exe 4924 powershell.exe 1536 powershell.exe 1536 powershell.exe 1536 powershell.exe 1472 powershell.exe 1472 powershell.exe 1472 powershell.exe 4156 powershell.exe 4156 powershell.exe 4156 powershell.exe 4548 powershell.exe 4548 powershell.exe 4548 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 4132 powershell.exe 4132 powershell.exe 4132 powershell.exe 3588 powershell.exe 3588 powershell.exe 3588 powershell.exe 444 powershell.exe 444 powershell.exe 444 powershell.exe 4624 powershell.exe 4624 powershell.exe 4624 powershell.exe 4672 powershell.exe 4672 powershell.exe 4672 powershell.exe 692 Process not Found 692 Process not Found 692 Process not Found 748 Process not Found 748 Process not Found 748 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3260 NursultanStart.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 560 powershell.exe Token: SeDebugPrivilege 2980 powershell.exe Token: SeIncreaseQuotaPrivilege 516 wmic.exe Token: SeSecurityPrivilege 516 wmic.exe Token: SeTakeOwnershipPrivilege 516 wmic.exe Token: SeLoadDriverPrivilege 516 wmic.exe Token: SeSystemProfilePrivilege 516 wmic.exe Token: SeSystemtimePrivilege 516 wmic.exe Token: SeProfSingleProcessPrivilege 516 wmic.exe Token: SeIncBasePriorityPrivilege 516 wmic.exe Token: SeCreatePagefilePrivilege 516 wmic.exe Token: SeBackupPrivilege 516 wmic.exe Token: SeRestorePrivilege 516 wmic.exe Token: SeShutdownPrivilege 516 wmic.exe Token: SeDebugPrivilege 516 wmic.exe Token: SeSystemEnvironmentPrivilege 516 wmic.exe Token: SeRemoteShutdownPrivilege 516 wmic.exe Token: SeUndockPrivilege 516 wmic.exe Token: SeManageVolumePrivilege 516 wmic.exe Token: 33 516 wmic.exe Token: 34 516 wmic.exe Token: 35 516 wmic.exe Token: 36 516 wmic.exe Token: SeIncreaseQuotaPrivilege 516 wmic.exe Token: SeSecurityPrivilege 516 wmic.exe Token: SeTakeOwnershipPrivilege 516 wmic.exe Token: SeLoadDriverPrivilege 516 wmic.exe Token: SeSystemProfilePrivilege 516 wmic.exe Token: SeSystemtimePrivilege 516 wmic.exe Token: SeProfSingleProcessPrivilege 516 wmic.exe Token: SeIncBasePriorityPrivilege 516 wmic.exe Token: SeCreatePagefilePrivilege 516 wmic.exe Token: SeBackupPrivilege 516 wmic.exe Token: SeRestorePrivilege 516 wmic.exe Token: SeShutdownPrivilege 516 wmic.exe Token: SeDebugPrivilege 516 wmic.exe Token: SeSystemEnvironmentPrivilege 516 wmic.exe Token: SeRemoteShutdownPrivilege 516 wmic.exe Token: SeUndockPrivilege 516 wmic.exe Token: SeManageVolumePrivilege 516 wmic.exe Token: 33 516 wmic.exe Token: 34 516 wmic.exe Token: 35 516 wmic.exe Token: 36 516 wmic.exe Token: SeIncreaseQuotaPrivilege 116 wmic.exe Token: SeSecurityPrivilege 116 wmic.exe Token: SeTakeOwnershipPrivilege 116 wmic.exe Token: SeLoadDriverPrivilege 116 wmic.exe Token: SeSystemProfilePrivilege 116 wmic.exe Token: SeSystemtimePrivilege 116 wmic.exe Token: SeProfSingleProcessPrivilege 116 wmic.exe Token: SeIncBasePriorityPrivilege 116 wmic.exe Token: SeCreatePagefilePrivilege 116 wmic.exe Token: SeBackupPrivilege 116 wmic.exe Token: SeRestorePrivilege 116 wmic.exe Token: SeShutdownPrivilege 116 wmic.exe Token: SeDebugPrivilege 116 wmic.exe Token: SeSystemEnvironmentPrivilege 116 wmic.exe Token: SeRemoteShutdownPrivilege 116 wmic.exe Token: SeUndockPrivilege 116 wmic.exe Token: SeManageVolumePrivilege 116 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3260 2960 start.exe 91 PID 2960 wrote to memory of 3260 2960 start.exe 91 PID 2960 wrote to memory of 2176 2960 start.exe 92 PID 2960 wrote to memory of 2176 2960 start.exe 92 PID 2960 wrote to memory of 2176 2960 start.exe 92 PID 2176 wrote to memory of 4988 2176 start.exe 93 PID 2176 wrote to memory of 4988 2176 start.exe 93 PID 2176 wrote to memory of 4152 2176 start.exe 94 PID 2176 wrote to memory of 4152 2176 start.exe 94 PID 2176 wrote to memory of 4152 2176 start.exe 94 PID 4152 wrote to memory of 2668 4152 start.exe 121 PID 4152 wrote to memory of 2668 4152 start.exe 121 PID 4152 wrote to memory of 5072 4152 start.exe 96 PID 4152 wrote to memory of 5072 4152 start.exe 96 PID 4152 wrote to memory of 5072 4152 start.exe 96 PID 5072 wrote to memory of 4252 5072 start.exe 188 PID 5072 wrote to memory of 4252 5072 start.exe 188 PID 5072 wrote to memory of 760 5072 start.exe 100 PID 5072 wrote to memory of 760 5072 start.exe 100 PID 5072 wrote to memory of 760 5072 start.exe 100 PID 760 wrote to memory of 4452 760 start.exe 101 PID 760 wrote to memory of 4452 760 start.exe 101 PID 3260 wrote to memory of 920 3260 NursultanStart.exe 102 PID 3260 wrote to memory of 920 3260 NursultanStart.exe 102 PID 760 wrote to memory of 1632 760 start.exe 175 PID 760 wrote to memory of 1632 760 start.exe 175 PID 760 wrote to memory of 1632 760 start.exe 175 PID 1632 wrote to memory of 2032 1632 start.exe 105 PID 1632 wrote to memory of 2032 1632 start.exe 105 PID 1632 wrote to memory of 4804 1632 start.exe 207 PID 1632 wrote to memory of 4804 1632 start.exe 207 PID 1632 wrote to memory of 4804 1632 start.exe 207 PID 4804 wrote to memory of 4960 4804 start.exe 196 PID 4804 wrote to memory of 4960 4804 start.exe 196 PID 4804 wrote to memory of 3936 4804 start.exe 108 PID 4804 wrote to memory of 3936 4804 start.exe 108 PID 4804 wrote to memory of 3936 4804 start.exe 108 PID 3936 wrote to memory of 1908 3936 start.exe 109 PID 3936 wrote to memory of 1908 3936 start.exe 109 PID 3936 wrote to memory of 972 3936 start.exe 110 PID 3936 wrote to memory of 972 3936 start.exe 110 PID 3936 wrote to memory of 972 3936 start.exe 110 PID 972 wrote to memory of 3920 972 start.exe 111 PID 972 wrote to memory of 3920 972 start.exe 111 PID 972 wrote to memory of 2704 972 start.exe 112 PID 972 wrote to memory of 2704 972 start.exe 112 PID 972 wrote to memory of 2704 972 start.exe 112 PID 2704 wrote to memory of 384 2704 start.exe 114 PID 2704 wrote to memory of 384 2704 start.exe 114 PID 2704 wrote to memory of 2800 2704 start.exe 115 PID 2704 wrote to memory of 2800 2704 start.exe 115 PID 2704 wrote to memory of 2800 2704 start.exe 115 PID 3260 wrote to memory of 872 3260 NursultanStart.exe 116 PID 3260 wrote to memory of 872 3260 NursultanStart.exe 116 PID 2800 wrote to memory of 4768 2800 start.exe 118 PID 2800 wrote to memory of 4768 2800 start.exe 118 PID 2800 wrote to memory of 4516 2800 start.exe 119 PID 2800 wrote to memory of 4516 2800 start.exe 119 PID 2800 wrote to memory of 4516 2800 start.exe 119 PID 4516 wrote to memory of 2964 4516 start.exe 120 PID 4516 wrote to memory of 2964 4516 start.exe 120 PID 4516 wrote to memory of 2668 4516 start.exe 121 PID 4516 wrote to memory of 2668 4516 start.exe 121 PID 4516 wrote to memory of 2668 4516 start.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1632
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4468
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:1500 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"3⤵
- Executes dropped EXE
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"4⤵
- Executes dropped EXE
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"5⤵
- Executes dropped EXE
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"6⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"7⤵
- Executes dropped EXE
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"8⤵
- Executes dropped EXE
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"9⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"10⤵
- Executes dropped EXE
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"11⤵
- Executes dropped EXE
PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"12⤵
- Executes dropped EXE
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"13⤵
- Executes dropped EXE
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"13⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"14⤵
- Executes dropped EXE
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"14⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"15⤵
- Executes dropped EXE
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"15⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"16⤵
- Executes dropped EXE
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"16⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"17⤵
- Executes dropped EXE
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"17⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"18⤵
- Executes dropped EXE
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"18⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"19⤵
- Executes dropped EXE
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"19⤵
- Executes dropped EXE
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"20⤵
- Executes dropped EXE
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"20⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"21⤵
- Executes dropped EXE
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"21⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"22⤵
- Executes dropped EXE
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"22⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"23⤵
- Executes dropped EXE
PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"23⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"24⤵
- Executes dropped EXE
PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"24⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"25⤵
- Executes dropped EXE
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"25⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"26⤵
- Executes dropped EXE
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"26⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"27⤵
- Executes dropped EXE
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"27⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"28⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"28⤵
- Executes dropped EXE
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"29⤵
- Executes dropped EXE
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"29⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"30⤵
- Executes dropped EXE
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"30⤵
- Executes dropped EXE
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"31⤵
- Executes dropped EXE
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"31⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"32⤵
- Executes dropped EXE
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"32⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"33⤵
- Executes dropped EXE
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"33⤵
- Executes dropped EXE
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"34⤵PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"34⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"35⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"35⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"36⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"36⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"37⤵PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"37⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"38⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"38⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"39⤵PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"39⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"40⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"40⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"41⤵PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"41⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"42⤵PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"42⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"43⤵PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"43⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"44⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"44⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"45⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"45⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"46⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"46⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"47⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"47⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"48⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"48⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"49⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"49⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"50⤵PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"50⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"51⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"51⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"52⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"52⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"53⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"53⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"54⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"54⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"55⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"55⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"56⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"56⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"57⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"57⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"58⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"58⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"59⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"59⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"60⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"60⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"61⤵PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"61⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"62⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"62⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"63⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"63⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"64⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"64⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"65⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"65⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"66⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"66⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"67⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"67⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"68⤵PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"68⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"69⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"69⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"70⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"70⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"71⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"71⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"72⤵PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"72⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"73⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"73⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"74⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"74⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"75⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"75⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"76⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"76⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"77⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"77⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"78⤵PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"78⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"79⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"79⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"80⤵PID:3392
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"80⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"81⤵PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"81⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"82⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"82⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"83⤵PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"83⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"84⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"84⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"85⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"85⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"86⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"86⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"87⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"87⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"88⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"88⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"89⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"89⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"90⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"90⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"91⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"91⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"92⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"92⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"93⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"93⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"94⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"94⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"95⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"95⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"96⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"96⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"97⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"97⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"98⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"98⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"99⤵PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"99⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"100⤵PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"100⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"101⤵PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"101⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"102⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"102⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"103⤵PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"103⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"104⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"104⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"105⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"105⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"106⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"106⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"107⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"107⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"108⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"108⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"109⤵PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"109⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"110⤵PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"110⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"111⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"111⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"112⤵PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"112⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"113⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"113⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"114⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"114⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"115⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"115⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"116⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"116⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"117⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"117⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"118⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"118⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"119⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"119⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"120⤵PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"120⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"121⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"121⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"C:\Users\Admin\AppData\Local\Temp\NursultanStart.exe"122⤵PID:4440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-