Overview
overview
10Static
static
5SHADOW BP ...IP.exe
windows7-x64
3SHADOW BP ...IP.exe
windows10-2004-x64
3SHADOW BP ...op.bat
windows7-x64
7SHADOW BP ...op.bat
windows10-2004-x64
1SHADOW BP ...it.exe
windows7-x64
7SHADOW BP ...it.exe
windows10-2004-x64
7SHADOW BP ...op.bat
windows7-x64
1SHADOW BP ...op.bat
windows10-2004-x64
1Windows De...ol.exe
windows7-x64
10Windows De...ol.exe
windows10-2004-x64
5Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 01:24
Behavioral task
behavioral1
Sample
SHADOW BP + HAX 3.4/BYPASS/Release/txn54kjdcy1#SHADOW VIP.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SHADOW BP + HAX 3.4/BYPASS/Release/txn54kjdcy1#SHADOW VIP.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
SHADOW BP + HAX 3.4/SETUP/Clean_Gameloop.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SHADOW BP + HAX 3.4/SETUP/Clean_Gameloop.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SHADOW BP + HAX 3.4/SETUP/Gameloop 32 Bit.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SHADOW BP + HAX 3.4/SETUP/Gameloop 32 Bit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SHADOW BP + HAX 3.4/SETUP/Kill_Gameloop.bat
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
SHADOW BP + HAX 3.4/SETUP/Kill_Gameloop.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Windows Defender Control/dControl.exe
Resource
win7-20241010-en
General
-
Target
SHADOW BP + HAX 3.4/SETUP/Clean_Gameloop.bat
-
Size
7KB
-
MD5
08e7d6aa12dd9e5326c95d48a39fc78c
-
SHA1
4cea4dc3fb778210b40ce7dda1f6d40184417155
-
SHA256
8f10f13dc60a2389ba5777932e9ed8ba746fad54231054cc5c91344c95f4dee2
-
SHA512
9ef6b53ac16e8f4b743d848b5e99a9f10eb16072569f04799ea69f1d7f20ff634e78b360ada717483a2c458638e3ed78acede7ac6ad87dd7dfd7165d275e17cc
-
SSDEEP
96:CSZyzyd6fHlzcZRcZocZ3cZOcZEcZVcZ6cZTcZXcZ8cZlcZCcZocZLcZ+cZC:ZcWJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Kills process with taskkill 50 IoCs
pid Process 2720 taskkill.exe 1372 taskkill.exe 1152 taskkill.exe 916 taskkill.exe 2600 taskkill.exe 1952 taskkill.exe 2852 taskkill.exe 2528 taskkill.exe 2204 taskkill.exe 2424 taskkill.exe 2228 taskkill.exe 2432 taskkill.exe 2800 taskkill.exe 2712 taskkill.exe 2652 taskkill.exe 1656 taskkill.exe 2732 taskkill.exe 2332 taskkill.exe 2516 taskkill.exe 1560 taskkill.exe 2552 taskkill.exe 1716 taskkill.exe 1868 taskkill.exe 1884 taskkill.exe 1772 taskkill.exe 2368 taskkill.exe 2220 taskkill.exe 1756 taskkill.exe 2116 taskkill.exe 2344 taskkill.exe 2236 taskkill.exe 2776 taskkill.exe 2736 taskkill.exe 2716 taskkill.exe 2604 taskkill.exe 2560 taskkill.exe 1760 taskkill.exe 1928 taskkill.exe 1296 taskkill.exe 2092 taskkill.exe 2464 taskkill.exe 2588 taskkill.exe 1500 taskkill.exe 2140 taskkill.exe 1880 taskkill.exe 280 taskkill.exe 2136 taskkill.exe 1980 taskkill.exe 3024 taskkill.exe 2356 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 2776 taskkill.exe Token: SeDebugPrivilege 2552 taskkill.exe Token: SeDebugPrivilege 2712 taskkill.exe Token: SeDebugPrivilege 2736 taskkill.exe Token: SeDebugPrivilege 2716 taskkill.exe Token: SeDebugPrivilege 2600 taskkill.exe Token: SeDebugPrivilege 2588 taskkill.exe Token: SeDebugPrivilege 2720 taskkill.exe Token: SeDebugPrivilege 2604 taskkill.exe Token: SeDebugPrivilege 2560 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 1868 taskkill.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeDebugPrivilege 1500 taskkill.exe Token: SeDebugPrivilege 2652 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 1928 taskkill.exe Token: SeDebugPrivilege 1372 taskkill.exe Token: SeDebugPrivilege 2528 taskkill.exe Token: SeDebugPrivilege 2140 taskkill.exe Token: SeDebugPrivilege 2204 taskkill.exe Token: SeDebugPrivilege 2424 taskkill.exe Token: SeDebugPrivilege 2236 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 2220 taskkill.exe Token: SeDebugPrivilege 1152 taskkill.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 1296 taskkill.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 280 taskkill.exe Token: SeDebugPrivilege 2432 taskkill.exe Token: SeDebugPrivilege 2732 taskkill.exe Token: SeDebugPrivilege 2136 taskkill.exe Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 2464 taskkill.exe Token: SeDebugPrivilege 2092 taskkill.exe Token: SeDebugPrivilege 2332 taskkill.exe Token: SeDebugPrivilege 3024 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 2356 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 2344 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 2800 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2776 2660 cmd.exe 31 PID 2660 wrote to memory of 2776 2660 cmd.exe 31 PID 2660 wrote to memory of 2776 2660 cmd.exe 31 PID 2660 wrote to memory of 2552 2660 cmd.exe 33 PID 2660 wrote to memory of 2552 2660 cmd.exe 33 PID 2660 wrote to memory of 2552 2660 cmd.exe 33 PID 2660 wrote to memory of 2712 2660 cmd.exe 34 PID 2660 wrote to memory of 2712 2660 cmd.exe 34 PID 2660 wrote to memory of 2712 2660 cmd.exe 34 PID 2660 wrote to memory of 2736 2660 cmd.exe 35 PID 2660 wrote to memory of 2736 2660 cmd.exe 35 PID 2660 wrote to memory of 2736 2660 cmd.exe 35 PID 2660 wrote to memory of 2716 2660 cmd.exe 36 PID 2660 wrote to memory of 2716 2660 cmd.exe 36 PID 2660 wrote to memory of 2716 2660 cmd.exe 36 PID 2660 wrote to memory of 2600 2660 cmd.exe 37 PID 2660 wrote to memory of 2600 2660 cmd.exe 37 PID 2660 wrote to memory of 2600 2660 cmd.exe 37 PID 2660 wrote to memory of 2588 2660 cmd.exe 38 PID 2660 wrote to memory of 2588 2660 cmd.exe 38 PID 2660 wrote to memory of 2588 2660 cmd.exe 38 PID 2660 wrote to memory of 2720 2660 cmd.exe 39 PID 2660 wrote to memory of 2720 2660 cmd.exe 39 PID 2660 wrote to memory of 2720 2660 cmd.exe 39 PID 2660 wrote to memory of 2604 2660 cmd.exe 40 PID 2660 wrote to memory of 2604 2660 cmd.exe 40 PID 2660 wrote to memory of 2604 2660 cmd.exe 40 PID 2660 wrote to memory of 2560 2660 cmd.exe 41 PID 2660 wrote to memory of 2560 2660 cmd.exe 41 PID 2660 wrote to memory of 2560 2660 cmd.exe 41 PID 2660 wrote to memory of 1716 2660 cmd.exe 42 PID 2660 wrote to memory of 1716 2660 cmd.exe 42 PID 2660 wrote to memory of 1716 2660 cmd.exe 42 PID 2660 wrote to memory of 1868 2660 cmd.exe 43 PID 2660 wrote to memory of 1868 2660 cmd.exe 43 PID 2660 wrote to memory of 1868 2660 cmd.exe 43 PID 2660 wrote to memory of 2368 2660 cmd.exe 44 PID 2660 wrote to memory of 2368 2660 cmd.exe 44 PID 2660 wrote to memory of 2368 2660 cmd.exe 44 PID 2660 wrote to memory of 1952 2660 cmd.exe 45 PID 2660 wrote to memory of 1952 2660 cmd.exe 45 PID 2660 wrote to memory of 1952 2660 cmd.exe 45 PID 2660 wrote to memory of 308 2660 cmd.exe 46 PID 2660 wrote to memory of 308 2660 cmd.exe 46 PID 2660 wrote to memory of 308 2660 cmd.exe 46 PID 308 wrote to memory of 708 308 net.exe 47 PID 308 wrote to memory of 708 308 net.exe 47 PID 308 wrote to memory of 708 308 net.exe 47 PID 2660 wrote to memory of 1700 2660 cmd.exe 48 PID 2660 wrote to memory of 1700 2660 cmd.exe 48 PID 2660 wrote to memory of 1700 2660 cmd.exe 48 PID 1700 wrote to memory of 896 1700 net.exe 49 PID 1700 wrote to memory of 896 1700 net.exe 49 PID 1700 wrote to memory of 896 1700 net.exe 49 PID 2660 wrote to memory of 1884 2660 cmd.exe 50 PID 2660 wrote to memory of 1884 2660 cmd.exe 50 PID 2660 wrote to memory of 1884 2660 cmd.exe 50 PID 2660 wrote to memory of 1500 2660 cmd.exe 51 PID 2660 wrote to memory of 1500 2660 cmd.exe 51 PID 2660 wrote to memory of 1500 2660 cmd.exe 51 PID 2660 wrote to memory of 2652 2660 cmd.exe 52 PID 2660 wrote to memory of 2652 2660 cmd.exe 52 PID 2660 wrote to memory of 2652 2660 cmd.exe 52 PID 2660 wrote to memory of 2852 2660 cmd.exe 53
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SHADOW BP + HAX 3.4\SETUP\Clean_Gameloop.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\taskkill.exetaskkill /f /im cef_frame_demo.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im cef_frame_render.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im appmarket.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im androidemulator.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im aow_exe.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im QMEmulatorService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im RuntimeBroker.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im adb.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im GameLoader.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TSettingCenter.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im AndroidEmulatorEn.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im AndroidEmulatorEx.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im AndroidRenderer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im syzs_dl_svr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\system32\net.exenet stop aow_drv2⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop aow_drv3⤵PID:708
-
-
-
C:\Windows\system32\net.exenet stop Tensafe2⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Tensafe3⤵PID:896
-
-
-
C:\Windows\system32\taskkill.exetaskkill /IM "Synaptics.exe" /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnf.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_1.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tensafe_2.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im tencentdl.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im conime.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im TBSWebRenderer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im qqlogin.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchina.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im dnfchinatest.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im txplatform.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im aow_exe.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM TitanService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM ProjectTitan.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Auxillary.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM TP3Helper.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM tp3helper.dat2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM androidemulator.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM aow_exe.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM QMEmulatorService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM RuntimeBroker.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im adb.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im GameLoader.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im TBSWebRenderer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im AppMarket.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im AndroidEmulator.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im syzs_dl_svr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\system32\taskkill.exetaskkill /F /im QMEmulatorService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM appmarket.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM androidemulator.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM aow_exe.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM QMEmulatorService.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM RuntimeBroker.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM adb.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM GameLoader.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM TSettingCenter.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\system32\net.exenet stop aow_drv2⤵PID:2772
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop aow_drv3⤵PID:2820
-
-
-
C:\Windows\system32\net.exenet stop Tensafe2⤵PID:2904
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Tensafe3⤵PID:2552
-
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Tencent" /f2⤵PID:2580
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Tencent" /f2⤵PID:2376
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache" /f2⤵
- Modifies registry class
PID:2744
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TencentMobileGameAssistant" /f2⤵PID:1336
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileGamePC" /f2⤵PID:2568
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\MobileGamePC" /f2⤵PID:3016
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.apk\OpenWithList" /f2⤵PID:2736
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QMEmulatorService" /f2⤵PID:1732
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\aow_drv" /f2⤵PID:2724
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "C:\Program Files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2768
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "D:\Program Files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2564
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "E:\Program Files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2556
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "F:\Program Files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2548
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "C:\Program Files\program files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2600
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "D:\Program Files\program files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2672
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "E:\Program Files\program files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2596
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "F:\Program Files\program files\txgameassistant\appmarket\AppMarket.exe" /f2⤵PID:2576
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "C:\Program Files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:2988
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "D:\Program Files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:1516
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "E:\Program Files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:2984
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "F:\Program Files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:2720
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "C:\Program Files\program files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:2996
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "D:\Program Files\program files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:1640
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "E:\Program Files\program files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:2008
-
-
C:\Windows\system32\reg.exereg delete "HKEY_USERS\S-1-5-21-1684716338-1731825245-2802686541-500\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store" /v "F:\Program Files\program files\txgameassistant\ui\AndroidEmulator.exe" /f2⤵PID:2012
-