Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2025, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe
-
Size
392KB
-
MD5
3a9720029c0f5bb91544409a999c9d09
-
SHA1
0c2e6bcd2117b30496df63bc36c7955a6bfc6635
-
SHA256
9e1751025908631420ddd8257775bedc2d57becd923a73e488e6b45a7fa69e05
-
SHA512
8d0af9fa03271b7e2e0c07ad448bebc49351791de44f4d7d3d151bb796f186f190b9823d865dd7c5947e60e2007efc3990b5e4dd965f6bbbe1048a53e8241674
-
SSDEEP
6144:31+Q6D6DuaHqL6K5bTQpgwjCv9EekXJjfnrCevDYUauHFptA8uDYMrmT8:3/6OaamerCmfZfnme74uHF3A8uDd
Malware Config
Extracted
nanocore
1.2.2.0
146.255.79.172:6789
omada12.mooo.com:6789
f73fa5dc-696f-4685-a6af-b9bb78345ab2
-
activate_away_mode
true
-
backup_connection_host
omada12.mooo.com
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-02-16T23:00:42.179393136Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
true
-
connect_delay
4000
-
connection_port
6789
-
default_group
ANGL
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f73fa5dc-696f-4685-a6af-b9bb78345ab2
-
mutex_timeout
5000
-
prevent_system_sleep
true
-
primary_connection_host
146.255.79.172
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Nanocore family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe -
Executes dropped EXE 2 IoCs
pid Process 4800 tmp.exe 3912 svhost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tmp.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe File opened for modification C:\Windows\assembly\Desktop.ini JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe -
Enumerates processes with tasklist 1 TTPs 64 IoCs
pid Process 3252 tasklist.exe 4436 tasklist.exe 8740 tasklist.exe 9304 tasklist.exe 10704 tasklist.exe 11168 tasklist.exe 6036 tasklist.exe 4720 tasklist.exe 11612 tasklist.exe 7772 tasklist.exe 7892 tasklist.exe 9900 tasklist.exe 9224 tasklist.exe 2160 tasklist.exe 7964 tasklist.exe 7124 tasklist.exe 8508 tasklist.exe 9532 tasklist.exe 10012 tasklist.exe 5548 tasklist.exe 6700 tasklist.exe 11968 tasklist.exe 6364 tasklist.exe 9304 tasklist.exe 5284 tasklist.exe 11728 tasklist.exe 11376 tasklist.exe 12204 tasklist.exe 5712 tasklist.exe 6516 tasklist.exe 8056 tasklist.exe 10024 tasklist.exe 9304 tasklist.exe 6392 tasklist.exe 1416 tasklist.exe 11848 tasklist.exe 4368 tasklist.exe 8068 tasklist.exe 11452 tasklist.exe 5696 tasklist.exe 8928 tasklist.exe 10492 tasklist.exe 11000 tasklist.exe 12096 tasklist.exe 5348 tasklist.exe 4600 tasklist.exe 4808 tasklist.exe 6824 tasklist.exe 7512 tasklist.exe 7976 tasklist.exe 7756 tasklist.exe 2664 tasklist.exe 10328 tasklist.exe 4108 tasklist.exe 5704 tasklist.exe 7184 tasklist.exe 7300 tasklist.exe 10336 tasklist.exe 10824 tasklist.exe 452 tasklist.exe 5836 tasklist.exe 664 tasklist.exe 7852 tasklist.exe 8276 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2612 set thread context of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe File created C:\Windows\assembly\Desktop.ini JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe File opened for modification C:\Windows\assembly\Desktop.ini JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 2720 timeout.exe 632 timeout.exe 3796 timeout.exe 3804 timeout.exe 10228 timeout.exe 4100 timeout.exe 5912 timeout.exe 6844 timeout.exe 10320 timeout.exe 11600 timeout.exe 11952 timeout.exe 9884 timeout.exe 10236 timeout.exe 8884 timeout.exe 11324 timeout.exe 11628 timeout.exe 11200 timeout.exe 2812 timeout.exe 5540 timeout.exe 7996 timeout.exe 10644 timeout.exe 10492 timeout.exe 11452 timeout.exe 10444 timeout.exe 692 timeout.exe 5564 timeout.exe 8160 timeout.exe 7988 timeout.exe 7688 timeout.exe 8372 timeout.exe 9572 timeout.exe 12276 timeout.exe 12096 timeout.exe 7284 timeout.exe 8268 timeout.exe 9644 timeout.exe 10952 timeout.exe 5032 timeout.exe 8380 timeout.exe 8536 timeout.exe 8740 timeout.exe 11356 timeout.exe 6892 timeout.exe 9564 timeout.exe 9092 timeout.exe 628 timeout.exe 3512 timeout.exe 184 timeout.exe 5372 timeout.exe 7612 timeout.exe 8172 timeout.exe 2596 timeout.exe 1596 timeout.exe 4628 timeout.exe 11440 timeout.exe 11828 timeout.exe 6572 timeout.exe 6760 timeout.exe 7628 timeout.exe 3840 timeout.exe 9804 timeout.exe 11152 timeout.exe 11232 timeout.exe 11860 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\tygfdfxxz:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 4800 tmp.exe 4800 tmp.exe 4800 tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4800 tmp.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe Token: SeDebugPrivilege 4800 tmp.exe Token: SeDebugPrivilege 4600 tasklist.exe Token: SeDebugPrivilege 2340 tasklist.exe Token: SeDebugPrivilege 3620 tasklist.exe Token: SeDebugPrivilege 592 tasklist.exe Token: SeDebugPrivilege 5100 tasklist.exe Token: SeDebugPrivilege 8 tasklist.exe Token: SeDebugPrivilege 664 tasklist.exe Token: SeDebugPrivilege 4556 tasklist.exe Token: SeDebugPrivilege 4404 tasklist.exe Token: SeDebugPrivilege 1644 tasklist.exe Token: SeDebugPrivilege 4108 tasklist.exe Token: SeDebugPrivilege 4720 tasklist.exe Token: SeDebugPrivilege 4808 tasklist.exe Token: SeDebugPrivilege 2812 tasklist.exe Token: SeDebugPrivilege 3252 tasklist.exe Token: SeDebugPrivilege 1548 tasklist.exe Token: SeDebugPrivilege 4556 tasklist.exe Token: SeDebugPrivilege 184 tasklist.exe Token: SeDebugPrivilege 3388 tasklist.exe Token: SeDebugPrivilege 368 tasklist.exe Token: SeDebugPrivilege 3376 tasklist.exe Token: SeDebugPrivilege 4436 tasklist.exe Token: SeDebugPrivilege 4080 tasklist.exe Token: SeDebugPrivilege 1952 tasklist.exe Token: SeDebugPrivilege 4428 tasklist.exe Token: SeDebugPrivilege 5520 tasklist.exe Token: SeDebugPrivilege 5712 tasklist.exe Token: SeDebugPrivilege 5932 tasklist.exe Token: SeDebugPrivilege 5280 tasklist.exe Token: SeDebugPrivilege 5696 tasklist.exe Token: SeDebugPrivilege 5952 tasklist.exe Token: SeDebugPrivilege 3868 tasklist.exe Token: SeDebugPrivilege 5580 tasklist.exe Token: SeDebugPrivilege 5284 tasklist.exe Token: SeDebugPrivilege 5752 tasklist.exe Token: SeDebugPrivilege 3816 tasklist.exe Token: SeDebugPrivilege 5376 tasklist.exe Token: SeDebugPrivilege 6248 tasklist.exe Token: SeDebugPrivilege 6368 tasklist.exe Token: SeDebugPrivilege 6472 tasklist.exe Token: SeDebugPrivilege 6588 tasklist.exe Token: SeDebugPrivilege 6704 tasklist.exe Token: SeDebugPrivilege 6820 tasklist.exe Token: SeDebugPrivilege 7040 tasklist.exe Token: SeDebugPrivilege 5360 tasklist.exe Token: SeDebugPrivilege 6400 tasklist.exe Token: SeDebugPrivilege 6824 tasklist.exe Token: SeDebugPrivilege 5704 tasklist.exe Token: SeDebugPrivilege 6364 tasklist.exe Token: SeDebugPrivilege 7116 tasklist.exe Token: SeDebugPrivilege 7124 tasklist.exe Token: SeDebugPrivilege 6516 tasklist.exe Token: SeDebugPrivilege 6224 tasklist.exe Token: SeDebugPrivilege 6844 tasklist.exe Token: SeDebugPrivilege 6940 tasklist.exe Token: SeDebugPrivilege 7184 tasklist.exe Token: SeDebugPrivilege 7300 tasklist.exe Token: SeDebugPrivilege 7408 tasklist.exe Token: SeDebugPrivilege 7512 tasklist.exe Token: SeDebugPrivilege 7628 tasklist.exe Token: SeDebugPrivilege 7740 tasklist.exe Token: SeDebugPrivilege 7852 tasklist.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3092 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 96 PID 2612 wrote to memory of 3092 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 96 PID 2612 wrote to memory of 3092 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 96 PID 3092 wrote to memory of 936 3092 cmd.exe 98 PID 3092 wrote to memory of 936 3092 cmd.exe 98 PID 3092 wrote to memory of 936 3092 cmd.exe 98 PID 2612 wrote to memory of 4800 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 99 PID 2612 wrote to memory of 4800 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 99 PID 2612 wrote to memory of 4800 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 99 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 3912 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 100 PID 2612 wrote to memory of 516 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 101 PID 2612 wrote to memory of 516 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 101 PID 2612 wrote to memory of 516 2612 JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe 101 PID 516 wrote to memory of 628 516 cmd.exe 103 PID 516 wrote to memory of 628 516 cmd.exe 103 PID 516 wrote to memory of 628 516 cmd.exe 103 PID 516 wrote to memory of 4600 516 cmd.exe 104 PID 516 wrote to memory of 4600 516 cmd.exe 104 PID 516 wrote to memory of 4600 516 cmd.exe 104 PID 516 wrote to memory of 884 516 cmd.exe 105 PID 516 wrote to memory of 884 516 cmd.exe 105 PID 516 wrote to memory of 884 516 cmd.exe 105 PID 516 wrote to memory of 3856 516 cmd.exe 106 PID 516 wrote to memory of 3856 516 cmd.exe 106 PID 516 wrote to memory of 3856 516 cmd.exe 106 PID 3856 wrote to memory of 1596 3856 cmd.exe 108 PID 3856 wrote to memory of 1596 3856 cmd.exe 108 PID 3856 wrote to memory of 1596 3856 cmd.exe 108 PID 3856 wrote to memory of 2340 3856 cmd.exe 109 PID 3856 wrote to memory of 2340 3856 cmd.exe 109 PID 3856 wrote to memory of 2340 3856 cmd.exe 109 PID 3856 wrote to memory of 1884 3856 cmd.exe 110 PID 3856 wrote to memory of 1884 3856 cmd.exe 110 PID 3856 wrote to memory of 1884 3856 cmd.exe 110 PID 3856 wrote to memory of 2848 3856 cmd.exe 111 PID 3856 wrote to memory of 2848 3856 cmd.exe 111 PID 3856 wrote to memory of 2848 3856 cmd.exe 111 PID 2848 wrote to memory of 2720 2848 cmd.exe 113 PID 2848 wrote to memory of 2720 2848 cmd.exe 113 PID 2848 wrote to memory of 2720 2848 cmd.exe 113 PID 2848 wrote to memory of 3620 2848 cmd.exe 114 PID 2848 wrote to memory of 3620 2848 cmd.exe 114 PID 2848 wrote to memory of 3620 2848 cmd.exe 114 PID 2848 wrote to memory of 3124 2848 cmd.exe 115 PID 2848 wrote to memory of 3124 2848 cmd.exe 115 PID 2848 wrote to memory of 3124 2848 cmd.exe 115 PID 2848 wrote to memory of 2940 2848 cmd.exe 116 PID 2848 wrote to memory of 2940 2848 cmd.exe 116 PID 2848 wrote to memory of 2940 2848 cmd.exe 116 PID 2940 wrote to memory of 3512 2940 cmd.exe 118 PID 2940 wrote to memory of 3512 2940 cmd.exe 118 PID 2940 wrote to memory of 3512 2940 cmd.exe 118 PID 2940 wrote to memory of 592 2940 cmd.exe 119 PID 2940 wrote to memory of 592 2940 cmd.exe 119 PID 2940 wrote to memory of 592 2940 cmd.exe 119 PID 2940 wrote to memory of 1552 2940 cmd.exe 120 PID 2940 wrote to memory of 1552 2940 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3a9720029c0f5bb91544409a999c9d09.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\tygfdfxxz.lnk" /f3⤵PID:936
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svhost.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa208f46f8,0x7ffa208f4708,0x7ffa208f47184⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:24⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:34⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:84⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:14⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:14⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:14⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:14⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:84⤵PID:7004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:84⤵PID:6456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:14⤵PID:6488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:14⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:14⤵PID:6424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11983764496755279815,4188503827885875229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:14⤵PID:6396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svhost.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵PID:5352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa208f46f8,0x7ffa208f4708,0x7ffa208f47184⤵PID:5328
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz.bat2⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397003⤵
- Delays execution with timeout.exe
PID:628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"3⤵PID:884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"3⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397004⤵PID:1596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"4⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"4⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397005⤵
- Delays execution with timeout.exe
PID:2720
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"5⤵PID:3124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"5⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397006⤵
- Delays execution with timeout.exe
PID:3512
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"6⤵PID:1552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"6⤵PID:3240
-
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397007⤵PID:4672
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"7⤵PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"7⤵PID:1488
-
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397008⤵PID:1496
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"8⤵
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"8⤵PID:4996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"8⤵
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\timeout.exetimeout /t 60065993397009⤵PID:3796
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"9⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"9⤵PID:3172
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970010⤵
- Delays execution with timeout.exe
PID:692
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"10⤵
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"10⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"10⤵PID:1356
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970011⤵PID:3196
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"11⤵
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"11⤵PID:4684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"11⤵PID:4152
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970012⤵
- Delays execution with timeout.exe
PID:184
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"12⤵PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"12⤵PID:1940
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970013⤵
- Delays execution with timeout.exe
PID:632
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"13⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"13⤵PID:2840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"13⤵PID:1852
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970014⤵PID:3452
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"14⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"14⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"14⤵PID:1120
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970015⤵PID:3628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"15⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"15⤵PID:2172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"15⤵PID:3560
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970016⤵PID:4444
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"16⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"16⤵PID:1800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"16⤵
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970017⤵PID:3636
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"17⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"17⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"17⤵PID:4996
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970018⤵
- Delays execution with timeout.exe
PID:3796
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"18⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"18⤵PID:4892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"18⤵PID:852
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970019⤵PID:4360
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"19⤵
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"19⤵PID:4208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"19⤵PID:2560
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970020⤵PID:4056
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"20⤵
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"20⤵PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"20⤵PID:2580
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970021⤵PID:1952
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"21⤵
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"21⤵PID:4036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"21⤵PID:2556
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970022⤵PID:4720
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"22⤵
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"22⤵PID:2340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"22⤵PID:4224
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970023⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"23⤵
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"23⤵PID:2856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"23⤵PID:5072
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970024⤵PID:4428
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"24⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"24⤵PID:3644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"24⤵PID:664
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970025⤵
- Delays execution with timeout.exe
PID:5032
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"25⤵
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"25⤵PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"25⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970026⤵PID:4572
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"26⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"26⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"26⤵PID:2156
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970027⤵
- Delays execution with timeout.exe
PID:2812
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"27⤵
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"27⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"27⤵PID:4080
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970028⤵
- System Location Discovery: System Language Discovery
PID:5468
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"28⤵
- Suspicious use of AdjustPrivilegeToken
PID:5520
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"28⤵PID:5536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"28⤵PID:5620
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970029⤵PID:5696
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"29⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"29⤵PID:5724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"29⤵PID:5808
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970030⤵PID:5912
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"30⤵
- Suspicious use of AdjustPrivilegeToken
PID:5932
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"30⤵PID:5940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"30⤵PID:6012
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970031⤵PID:552
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"31⤵
- Suspicious use of AdjustPrivilegeToken
PID:5280
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"31⤵PID:5288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"31⤵PID:5356
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970032⤵
- Delays execution with timeout.exe
PID:5564
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"32⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5696
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"32⤵PID:5756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"32⤵PID:5716
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970033⤵
- Delays execution with timeout.exe
PID:5912
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"33⤵
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"33⤵PID:5948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"33⤵PID:6092
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970034⤵PID:4428
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"34⤵
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"34⤵
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"34⤵PID:5364
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:5288
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970035⤵
- Delays execution with timeout.exe
PID:5540
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"35⤵
- Suspicious use of AdjustPrivilegeToken
PID:5580
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"35⤵PID:5696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"35⤵PID:5740
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970036⤵PID:5376
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"36⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5284
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"36⤵PID:3868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"36⤵PID:2760
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970037⤵PID:5340
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"37⤵
- Suspicious use of AdjustPrivilegeToken
PID:5752
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"37⤵PID:5324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"37⤵PID:5396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV138⤵PID:3868
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970038⤵
- Delays execution with timeout.exe
PID:3804
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"38⤵
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"38⤵PID:5344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"38⤵
- System Location Discovery: System Language Discovery
PID:5432 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:5368
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970039⤵
- Delays execution with timeout.exe
PID:5372
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"39⤵
- Suspicious use of AdjustPrivilegeToken
PID:5376
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"39⤵PID:5360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"39⤵PID:6164
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970040⤵PID:6228
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"40⤵
- Suspicious use of AdjustPrivilegeToken
PID:6248
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"40⤵PID:6256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"40⤵PID:6300
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970041⤵PID:6352
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"41⤵
- Suspicious use of AdjustPrivilegeToken
PID:6368
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"41⤵PID:6376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"41⤵PID:6412
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970042⤵PID:6456
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"42⤵
- Suspicious use of AdjustPrivilegeToken
PID:6472
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"42⤵PID:6480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"42⤵PID:6520
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970043⤵
- Delays execution with timeout.exe
PID:6572
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"43⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6588
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"43⤵PID:6600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"43⤵PID:6636
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970044⤵PID:6680
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"44⤵
- Suspicious use of AdjustPrivilegeToken
PID:6704
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"44⤵PID:6712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"44⤵PID:6748
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970045⤵PID:6804
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"45⤵
- Suspicious use of AdjustPrivilegeToken
PID:6820
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"45⤵PID:6828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"45⤵PID:6864
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970046⤵PID:6980
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"46⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7040
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"46⤵PID:7048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"46⤵PID:7104
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970047⤵PID:5376
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"47⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"47⤵PID:5984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"47⤵PID:5828
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970048⤵PID:6356
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"48⤵
- Suspicious use of AdjustPrivilegeToken
PID:6400
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"48⤵
- System Location Discovery: System Language Discovery
PID:6384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"48⤵PID:6608
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970049⤵
- Delays execution with timeout.exe
PID:6760
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"49⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6824
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"49⤵PID:6856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"49⤵PID:6960
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970050⤵PID:7052
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"50⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5704
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"50⤵PID:4052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"50⤵PID:5252
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:5344
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970051⤵PID:5360
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"51⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6364
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"51⤵PID:6360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"51⤵PID:6400
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970052⤵
- System Location Discovery: System Language Discovery
PID:6844
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"52⤵
- Suspicious use of AdjustPrivilegeToken
PID:7116
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"52⤵PID:7052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"52⤵PID:5744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:6356
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970053⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6844
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"53⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7124
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"53⤵PID:6248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"53⤵PID:5376
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970054⤵PID:6844
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"54⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6516
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"54⤵PID:7096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"54⤵
- System Location Discovery: System Language Discovery
PID:7128 -
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970055⤵PID:6924
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"55⤵
- Suspicious use of AdjustPrivilegeToken
PID:6224
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"55⤵PID:7084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"55⤵PID:5756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV156⤵PID:6516
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970056⤵PID:6924
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"56⤵
- Suspicious use of AdjustPrivilegeToken
PID:6844
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"56⤵PID:7140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"56⤵PID:6272
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970057⤵PID:7068
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"57⤵
- Suspicious use of AdjustPrivilegeToken
PID:6940
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"57⤵
- System Location Discovery: System Language Discovery
PID:6488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"57⤵PID:6924
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970058⤵PID:5704
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"58⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7184
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"58⤵PID:7192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"58⤵
- System Location Discovery: System Language Discovery
PID:7228 -
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970059⤵
- Delays execution with timeout.exe
PID:7284
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"59⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7300
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"59⤵PID:7308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"59⤵PID:7344
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970060⤵PID:7392
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"60⤵
- Suspicious use of AdjustPrivilegeToken
PID:7408
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"60⤵PID:7416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"60⤵PID:7452
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970061⤵PID:7496
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"61⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7512
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"61⤵PID:7520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"61⤵PID:7560
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970062⤵
- Delays execution with timeout.exe
PID:7612
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"62⤵
- Suspicious use of AdjustPrivilegeToken
PID:7628
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"62⤵PID:7636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"62⤵PID:7672
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970063⤵PID:7724
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"63⤵
- Suspicious use of AdjustPrivilegeToken
PID:7740
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"63⤵PID:7748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"63⤵PID:7788
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970064⤵PID:7836
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"64⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7852
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"64⤵PID:7860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"64⤵
- System Location Discovery: System Language Discovery
PID:7896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970065⤵PID:7948
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"65⤵
- Enumerates processes with tasklist
PID:7964
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"65⤵PID:7972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"65⤵PID:8008
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970066⤵PID:8052
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"66⤵
- Enumerates processes with tasklist
PID:8068
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"66⤵
- System Location Discovery: System Language Discovery
PID:8076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"66⤵PID:8112
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970067⤵
- Delays execution with timeout.exe
PID:8160
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"67⤵PID:8176
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"67⤵PID:8184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"67⤵PID:7220
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970068⤵PID:7292
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"68⤵PID:7340
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"68⤵PID:7304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"68⤵PID:7400
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970069⤵PID:7420
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"69⤵PID:7504
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"69⤵PID:7536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"69⤵
- System Location Discovery: System Language Discovery
PID:7524 -
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970070⤵PID:7628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"70⤵PID:7636
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"70⤵PID:7688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"70⤵PID:7760
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970071⤵PID:7800
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"71⤵PID:7884
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"71⤵PID:7876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"71⤵PID:7908
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970072⤵
- Delays execution with timeout.exe
PID:7988
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"72⤵
- Enumerates processes with tasklist
PID:8056
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"72⤵PID:8060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"72⤵PID:8080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:8068
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970073⤵
- Delays execution with timeout.exe
PID:8172
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"73⤵PID:7200
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"73⤵
- System Location Discovery: System Language Discovery
PID:8188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"73⤵PID:7208
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970074⤵PID:7320
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"74⤵PID:7340
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"74⤵
- System Location Discovery: System Language Discovery
PID:7448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"74⤵PID:7532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:7504
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970075⤵
- Delays execution with timeout.exe
PID:7628
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"75⤵
- Enumerates processes with tasklist
PID:7772
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"75⤵PID:7692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"75⤵PID:7800
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970076⤵PID:7876
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"76⤵
- Enumerates processes with tasklist
PID:7976
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"76⤵PID:7972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"76⤵PID:8072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:8052
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970077⤵PID:7064
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"77⤵PID:7316
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"77⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"77⤵PID:7508
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970078⤵PID:7844
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"78⤵
- Enumerates processes with tasklist
PID:7756
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"78⤵PID:7636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"78⤵PID:8088
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970079⤵PID:7196
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"79⤵PID:7180
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"79⤵PID:8176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"79⤵PID:7340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV180⤵PID:7320
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970080⤵PID:7772
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"80⤵
- Enumerates processes with tasklist
PID:7892
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"80⤵PID:7692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"80⤵PID:8104
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970081⤵PID:7416
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"81⤵PID:7420
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"81⤵PID:2952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"81⤵PID:8056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV182⤵PID:7756
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970082⤵
- Delays execution with timeout.exe
PID:7688
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"82⤵PID:7948
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"82⤵PID:7772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"82⤵PID:7636
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970083⤵
- Delays execution with timeout.exe
PID:7996
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"83⤵PID:1848
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"83⤵PID:6956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"83⤵PID:8204
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970084⤵PID:8260
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"84⤵
- Enumerates processes with tasklist
PID:8276
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"84⤵PID:8284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"84⤵PID:8320
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970085⤵
- Delays execution with timeout.exe
PID:8372
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"85⤵PID:8388
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"85⤵PID:8404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"85⤵PID:8432
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970086⤵PID:8484
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"86⤵
- Enumerates processes with tasklist
PID:8508
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"86⤵PID:8516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"86⤵PID:8552
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970087⤵PID:8616
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"87⤵PID:8632
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"87⤵PID:8640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"87⤵PID:8684
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970088⤵PID:8740
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"88⤵PID:8756
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"88⤵PID:8764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"88⤵PID:8800
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970089⤵PID:8856
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"89⤵PID:8872
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"89⤵
- System Location Discovery: System Language Discovery
PID:8880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"89⤵PID:8916
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970090⤵PID:8972
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"90⤵PID:8988
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"90⤵PID:8996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"90⤵PID:9032
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970091⤵PID:9092
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"91⤵
- System Location Discovery: System Language Discovery
PID:9108
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"91⤵PID:9116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"91⤵PID:9152
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970092⤵
- Delays execution with timeout.exe
PID:2596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"92⤵PID:1848
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"92⤵PID:7772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"92⤵PID:8292
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970093⤵
- Delays execution with timeout.exe
PID:8380
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"93⤵PID:8400
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"93⤵
- System Location Discovery: System Language Discovery
PID:8392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"93⤵PID:8444
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970094⤵
- Delays execution with timeout.exe
PID:8536
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"94⤵PID:8572
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"94⤵PID:8620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"94⤵PID:8648
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970095⤵
- Delays execution with timeout.exe
PID:8740
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"95⤵PID:8760
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"95⤵PID:8784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"95⤵PID:2536
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970096⤵PID:8912
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"96⤵
- Enumerates processes with tasklist
PID:8928
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"96⤵PID:8984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"96⤵PID:9012
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970097⤵
- Delays execution with timeout.exe
PID:9092
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"97⤵PID:9112
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"97⤵PID:9144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"97⤵PID:3036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV198⤵PID:2952
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970098⤵
- Delays execution with timeout.exe
PID:8268
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"98⤵PID:8272
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"98⤵PID:8312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"98⤵PID:8400
-
C:\Windows\SysWOW64\timeout.exetimeout /t 600659933970099⤵PID:8652
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"99⤵PID:8676
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"99⤵PID:8620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"99⤵PID:8768
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700100⤵PID:8900
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"100⤵PID:9004
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"100⤵PID:8972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"100⤵PID:8996
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700101⤵PID:9204
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"101⤵PID:9144
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"101⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"101⤵PID:8388
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700102⤵PID:9028
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"102⤵
- Enumerates processes with tasklist
PID:8740
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"102⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"102⤵PID:8772
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700103⤵
- System Location Discovery: System Language Discovery
PID:9128
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"103⤵PID:9132
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"103⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"103⤵PID:9144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1104⤵PID:2352
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700104⤵PID:8620
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"104⤵PID:8656
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"104⤵PID:8628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"104⤵PID:8900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:8912
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700105⤵PID:1144
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"105⤵PID:9132
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"105⤵
- System Location Discovery: System Language Discovery
PID:6956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"105⤵PID:5604
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700106⤵
- Delays execution with timeout.exe
PID:3840
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"106⤵PID:1144
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"106⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"106⤵PID:8676
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700107⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"107⤵PID:8408
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"107⤵PID:2776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"107⤵PID:9244
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700108⤵
- System Location Discovery: System Language Discovery
PID:9288
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"108⤵
- Enumerates processes with tasklist
PID:9304
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"108⤵PID:9312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"108⤵PID:9356
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700109⤵PID:9400
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"109⤵PID:9416
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"109⤵PID:9424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"109⤵PID:9468
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700110⤵PID:9516
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"110⤵
- Enumerates processes with tasklist
PID:9532
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"110⤵PID:9540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"110⤵PID:9588
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700111⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:9644
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"111⤵PID:9668
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"111⤵PID:9676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"111⤵PID:9712
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700112⤵PID:9776
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"112⤵PID:9792
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"112⤵PID:9800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"112⤵PID:9836
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700113⤵
- Delays execution with timeout.exe
PID:9884
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"113⤵
- Enumerates processes with tasklist
PID:9900
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"113⤵PID:9908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"113⤵PID:9952
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700114⤵PID:9996
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"114⤵
- Enumerates processes with tasklist
PID:10012
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"114⤵
- System Location Discovery: System Language Discovery
PID:10020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"114⤵PID:10056
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700115⤵PID:10108
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"115⤵PID:10124
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"115⤵PID:10132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"115⤵PID:10168
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700116⤵
- Delays execution with timeout.exe
PID:10228
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"116⤵PID:9220
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"116⤵PID:9124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"116⤵PID:1952
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700117⤵PID:9324
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"117⤵
- Enumerates processes with tasklist
PID:9304
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"117⤵PID:9336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"117⤵PID:6136
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700118⤵PID:9524
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"118⤵
- Enumerates processes with tasklist
PID:5548
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"118⤵PID:9572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"118⤵PID:9556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:9540
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700119⤵PID:9700
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"119⤵PID:9704
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"119⤵PID:9672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"119⤵PID:9780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1120⤵PID:9776
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700120⤵
- Delays execution with timeout.exe
PID:9804
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"120⤵PID:9884
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"120⤵PID:9924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"120⤵PID:9908
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700121⤵PID:10028
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh /fi "imagename eq .exe"121⤵
- Enumerates processes with tasklist
PID:10024
-
-
C:\Windows\SysWOW64\find.exefind /i ".exe"121⤵PID:10068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\FolderN\tygfdfxxz"121⤵PID:10128
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6006599339700122⤵PID:10236
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-