Analysis
-
max time kernel
296s -
max time network
298s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-04-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
Peki Spoofer V4.exe
Resource
win11-20240412-en
General
-
Target
Peki Spoofer V4.exe
-
Size
548KB
-
MD5
c711b8ca38bb8185a6d6e41c38070538
-
SHA1
465826e7cbc72487a4885e325a21d4ec66a1bdcf
-
SHA256
ea1ac23002a691f0822ba54c6624f518251d946492ef1ef5c9286959d86b968b
-
SHA512
7579d576be88908b70f23e1e33c99162090339a8b5a2dfec9212b82845b50bfa84dfaec431abd4ec0a169701c4cde93d3552851d53421eb2ab1517001b5338a0
-
SSDEEP
12288:EQ1UK4SmbfMcsgJqyE/KWcRTTjyRrn/FvPF:EQ1rmrMZ8WcJHyVN
Malware Config
Signatures
-
Cerber 23 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
Processes:
taskkill.exetaskkill.exetaskkill.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exetaskkill.exetaskkill.exetaskkill.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exetaskkill.exetaskkill.exetaskkill.exepid process 1404 taskkill.exe 5052 taskkill.exe 4328 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe 2084 taskkill.exe 2028 taskkill.exe 4948 taskkill.exe 1816 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe 4568 taskkill.exe 1036 taskkill.exe 3872 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} AMIDEWINx64.exe 6908 taskkill.exe 656 taskkill.exe 2156 taskkill.exe -
Nirsoft 2 IoCs
Processes:
resource yara_rule C:\Windows\INF\dr43.exe Nirsoft C:\ProgramData\Microsoft\Windows\DevManView.exe Nirsoft -
Downloads MZ/PE file
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winmgmt\Parameters\ServiceDll = "%SystemRoot%\\system32\\wbem\\WMIsvc.dll" regsvr32.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 28 IoCs
Processes:
Peki_Spoofer_V4.exePeki_Spoofer_V4.exedr43.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exepid process 1688 Peki_Spoofer_V4.exe 4264 Peki_Spoofer_V4.exe 1200 dr43.exe 6532 DevManView.exe 6548 DevManView.exe 4600 DevManView.exe 4588 DevManView.exe 2916 DevManView.exe 3384 DevManView.exe 6560 DevManView.exe 6568 DevManView.exe 2672 DevManView.exe 2408 DevManView.exe 3676 DevManView.exe 4792 DevManView.exe 4652 DevManView.exe 6588 DevManView.exe 6636 DevManView.exe 6684 AMIDEWINx64.exe 412 AMIDEWINx64.exe 1180 AMIDEWINx64.exe 4412 AMIDEWINx64.exe 4760 AMIDEWINx64.exe 3572 AMIDEWINx64.exe 252 AMIDEWINx64.exe 248 AMIDEWINx64.exe 3048 AMIDEWINx64.exe 2296 AMIDEWINx64.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5791BC26-CE9C-11D1-97BF-0000F81E849C}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EC231970-6AFD-4215-A72E-97242BB08680}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1F0BC6AD-46D4-488B-BE1F-047FC7505E60}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4FA18276-912A-11D1-AD9B-00C04FD8FDFF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6515834D-6125-4878-A3A3-6B0A73B809A2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A571F412-E3D2-4A32-BF42-1D3B2203FF17}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{72967903-68EC-11D0-B729-00AA0062CBB7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{443E7B79-DE31-11D2-B340-00104BCC4B4A}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3DD82D10-E6F1-11D2-B139-00105A1F77A1}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EC231970-6AFD-4215-A72E-97242BB08680}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7A3A54B-0250-11D3-9CD1-00105A1F4801}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0C0B0642-1DEB-43DF-8032-7A9BF5811A74}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{890CB943-D715-401B-98B1-CF82DCF36D7C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5C659258-E236-11D2-8899-00104B2AFB46}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A3E41207-BE04-492A-AFF0-19E880FF7545}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C0AA9D93-2EF5-47FB-960C-F90FC644B48E}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9A653086-174F-11D2-B5F9-00104B703EFD}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8D1C559D-84F0-4BB3-A7D5-56A7435A9BA6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{55F7B88D-A254-4B22-B7BB-FCDBBA1AFA32}\InprocServer32\ = "C:\\Windows\\System32\\wbem\\Microsoft.Uev.AgentWmi.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5D08B586-343A-11D0-AD46-00C04FD8FDFF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C10B4771-4DA0-11D2-A2F5-00C04F86FB7D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4CFC7932-0F9D-4BEF-9C32-8EA2A6B56FCB}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{661FF7F6-F4D1-4593-B59D-4C54C1ECE68B}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{00B8308C-09F2-4c18-A7B0-4594D6B22EFE}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1108BE51-F58A-4CDA-BB99-7A0227D11D5E}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FD209E2E-813B-41C0-8646-4C3E9C917511}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D4950C79-806D-4ECE-9DB1-11B34D33F514}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0C0B0642-1DEB-43DF-8032-7A9BF5811A74}\InprocServer32\ = "C:\\Windows\\System32\\wbem\\Microsoft.Uev.AgentWmi.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DCF33DF4-B510-439F-832A-16B6B514F2A7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CC9072AB-C000-49D8-A5AA-00266C8DBB9B}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D4950C79-806D-4ECE-9DB1-11B34D33F514}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7E9D3B9-E62B-4A90-8CC5-A3C5F662DA7B}\InprocServer32\ = "C:\\Windows\\System32\\wbem\\Microsoft.Uev.AgentWmi.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D31B6A3F-9350-40DE-A3FC-A7EDEB9B7C63}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{55F7B88D-A254-4B22-B7BB-FCDBBA1AFA32}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9AED384E-CE8B-11D1-8B05-00600806D9B6}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{734AC5AE-68E1-4FB5-B8DA-1D92F7FC6661}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7F598975-37E0-4A67-A992-116680F0CEDA}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D63A5850-8F16-11CF-9F47-00AA00BF345C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{33831ED4-42B8-11D2-93AD-00805F853771}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{33831ED4-42B8-11D2-93AD-00805F853771}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D4950C79-806D-4ECE-9DB1-11B34D33F514}\InprocServer32\ = "C:\\Windows\\System32\\wbem\\Microsoft.Uev.AgentWmi.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CD184336-9128-11D1-AD9B-00C04FD8FDFF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7998DC37-D3FE-487C-A60A-7701FCC70CC6}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6D7A4B0E-66D5-4AC3-A7ED-0189E8CF5E77}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EAC8A024-21E2-4523-AD73-A71A0AA2F56A}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7E9D3B9-E62B-4A90-8CC5-A3C5F662DA7B}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{72970BEB-81F8-46D4-B220-D743F4E49C95}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{75718C9A-F029-11D1-A1AC-00C04FB6C223}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{78103FB7-AED7-4066-8BCD-30BB27B02331}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AA527A40-4D9A-11D2-93AD-00805F853771}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A571F412-E3D2-4A32-BF42-1D3B2203FF17}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F55C5B4C-517D-11D1-AB57-00C04FD9159E}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D269BF5C-D9C1-11D3-B38F-00105A1F473A}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F5F75737-2843-4F22-933D-C76A97CDA62F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA2AF3B4-C15E-412b-B453-557746675FB7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6c19be35-7500-11d1-ad94-00c04fd8fdff}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4590F812-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{523A581F-EC58-40CE-99D3-36BF7897F3EC}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{523A581F-EC58-40CE-99D3-36BF7897F3EC}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C2FEEEAC-CFCD-11D1-8B05-00600806D9B6}\InProcServer32 regsvr32.exe -
Enumerates connected drives 3 TTPs 30 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
DevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exedescription ioc process File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\D: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\F: DevManView.exe File opened (read-only) \??\D: DevManView.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
Processes:
flow ioc 36 discord.com 88 discord.com 99 discord.com 183 discord.com 39 discord.com 115 discord.com 123 discord.com 155 discord.com 173 discord.com 81 discord.com 93 discord.com 186 discord.com 38 discord.com 89 discord.com 135 discord.com 190 discord.com -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
DevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Delete value \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\NextInstance = "0" DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count = "0" DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 DevManView.exe -
Drops file in System32 directory 64 IoCs
Processes:
mofcomp.exemofcomp.exesvchost.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exeregsvr32.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exemofcomp.exedescription ioc process File created C:\Windows\system32\wbem\AutoRecover\C59549B4F20BC001A0A645775AB7BE45.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\15CB6E2BC4C7288B6A26F06F2EA3EBAA.mof mofcomp.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP svchost.exe File created C:\Windows\system32\wbem\AutoRecover\FD38E89965714BC8838FE9C66DB5567D.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\6B4B3EE7432DA52E30DCD4AA1E80B4F2.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\2E8F3CA90E51B47160C820C8A9D25C70.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\3E2C8A6A5EEECAC8DDDF4B502F3D3118.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\FB42973CC6B430B383BA62328763E302.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\EC334120AAC576B5B016EFBD4CB50498.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\B16B0DDE7AC8EE97D6CF843A06985EFA.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\2CFB5B149FA396D1AEA5F89B1C5A8D81.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\F0E76792C542307D2F6A5D4DD4C90DB8.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\80792982BF972E1BFD199DE5636C38C5.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\DB3D8DB0C02C23250753E40A2A69CBE6.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\17FFDF80330024B07853138CB5AFAD9C.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\88744D2A29102FC88ECF505DD2E984FC.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\F01326692CC5736EBAC31B9FC2381CF2.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\5966D45C7B25EACA46E87DD8E5703964.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\4273CA093A54B161AE6A9FA019048CE8.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\77AF494807BB41A0B4B67AEEC51F85C6.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\97823DC673AD0F92AB9B83F4C177678B.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\D209D533EE8C97B5E2C46D035373F422.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\AA44637A243C8CA317FA500EB39EAFDF.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\C3A0BE17B37ACE48BE78B31580231AE9.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\CBD66ABF99AFFFA4375E215A3072C696.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\0772EA28C9AD9F026AA9F29EE684B717.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\3DC0BABDCA20E5E319117C21BD4BD795.mof mofcomp.exe File created C:\Windows\system32\perfh009.dat regsvr32.exe File created C:\Windows\system32\wbem\AutoRecover\26C097A9392F8C541AD42E89B7909073.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\42C894EEACAD83A4E41154685841B3E1.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\8636DC7F9479DACE6778109CB4FB4B01.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\A09A7FDBA9278B3329DD4662E80BFE42.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\76FC6ECE6E69615238BD782572B6AE9A.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\2E4D1429BE1911C37755271D939627EF.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\3BB9AB7BAA63F54A0832A3003DBC2FD0.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\844A429FB6680A32838047A6271F8CD9.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\38EE6C630467A006990C5977C3058C94.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\494C62FAA08CD5217399BAA555FF491B.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\8C226ACD9934CF6AC0A2FED330FF195D.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\8EE8FC83289049798EE5B66322A8DA45.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\D38FFA40EC29A055EB37EBD604093C62.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\22BD4E705855FAECE7FFAB23C49D3662.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\9792C1210EF405B66D63B9792E3E9FB3.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\ADC76C6473F1C3722A0A86C2A9AED340.mof mofcomp.exe File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.ini regsvr32.exe File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST svchost.exe File created C:\Windows\system32\wbem\AutoRecover\D0C5C729E970878A5B11C5AE54A0B179.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\28A02B0A6F3BEA0572B8F35350D88657.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\BE81B2C0741907C1FC1C42B6223E59AD.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\4A870B469F34065CA18AB1FDF6312BDF.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\37134956F76D3C30C9BE0C12571CAF43.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\AFFA4734C9FA7C4A3BDE5528A94427A4.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\A7575F8DE31A912FFE91A7A41B1E382A.mof mofcomp.exe File created C:\Windows\system32\wbem\Performance\WmiApRpl_new.h regsvr32.exe File created C:\Windows\system32\wbem\AutoRecover\6FFF7467A5B40765D5740A413CA8BB8A.mof mofcomp.exe File created C:\Windows\system32\perfc009.dat regsvr32.exe File created C:\Windows\system32\wbem\AutoRecover\C81ACF420917AA0F87487BC4D958BEB4.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\A4E4450F82FCBDED5A110855857A16B9.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\75054C3771DF289038069A9BB1C1FB6E.mof mofcomp.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP svchost.exe File created C:\Windows\system32\wbem\AutoRecover\B3D1279CF76B72D4874D43A6EF458EF8.mof mofcomp.exe File created C:\Windows\system32\wbem\AutoRecover\B0CDB37CD965AA678CCF2531689C22DE.mof mofcomp.exe File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP svchost.exe File created C:\Windows\system32\wbem\AutoRecover\3A01647A9113490045B9D4AE10390941.mof mofcomp.exe -
Drops file in Windows directory 10 IoCs
Processes:
Peki_Spoofer_V4.exeDevManView.exeregsvr32.exePeki Spoofer V4.exePeki_Spoofer_V4.exeDevManView.exedescription ioc process File created C:\Windows\INF\FNCLEAN.bat Peki_Spoofer_V4.exe File opened for modification C:\Windows\INF\setupapi.dev.log DevManView.exe File opened for modification C:\Windows\inf\WmiApRpl\WmiApRpl.ini regsvr32.exe File created C:\Windows\inf\WmiApRpl\WmiApRpl.ini regsvr32.exe File created C:\Windows\INF\Peki_Spoofer_V4.exe Peki Spoofer V4.exe File opened for modification C:\Windows\INF\Peki_Spoofer_V4.exe Peki_Spoofer_V4.exe File created C:\Windows\INF\dr43.exe Peki_Spoofer_V4.exe File opened for modification C:\Windows\INF\setupapi.dev.log DevManView.exe File created C:\Windows\inf\WmiApRpl\WmiApRpl.h regsvr32.exe File opened for modification C:\Windows\inf\WmiApRpl\WmiApRpl.h regsvr32.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exepid process 3880 sc.exe 4228 sc.exe 1692 sc.exe 1092 sc.exe 4840 sc.exe 3768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
DevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0009 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000067\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29} DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Control DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000067\00000000 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000064\00000000 DevManView.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LocationInformation DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ContainerID DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29} DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ContainerID DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LocationInformation DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ClassGuid DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000067\00000000 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066 DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ClassGuid DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Control DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000065\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0065\ DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0066\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000066\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LocationInformation DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064 DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000065\00000000 DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ClassGUID DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0064\ DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067\ DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 DevManView.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK DevManView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0067 DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM DevManView.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2} DevManView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\00000067\00000000 DevManView.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exemsedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 14 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5052 taskkill.exe 2084 taskkill.exe 4328 taskkill.exe 4948 taskkill.exe 1036 taskkill.exe 1816 taskkill.exe 1404 taskkill.exe 6908 taskkill.exe 2028 taskkill.exe 656 taskkill.exe 6752 taskkill.exe 4568 taskkill.exe 3872 taskkill.exe 2156 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133585475979511782" chrome.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeWmiPrvSE.exeregsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{72970BEB-81F8-46D4-B220-D743F4E49C95} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9F6C78EF-FCE5-42FA-ABEA-3E7DF91921DC}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WINMGMTS\ = "Wbem Scripting Object Path" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BAC6B661-167E-4957-AD77-286AB256585E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FD4F53E0-65DC-11D1-AB64-00C04FD9159E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1BE41572-91DD-11D1-AEB2-00C04FB68820}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D4950C79-806D-4ECE-9DB1-11B34D33F514} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7E9D3B9-E62B-4A90-8CC5-A3C5F662DA7B}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C7A3A54B-0250-11D3-9CD1-00105A1F4801} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{266C72E5-62E8-11D1-AD89-00C04FD8FDFF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{ED999FF5-223A-4052-8ECE-0B10C8DBAA39} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{631F7D97-D993-11D2-B339-00105A1F4AAF}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BEBCE8B-1AF0-4323-8B4D-36994567CAE1}\NotInsertable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{027947E1-D731-11CE-A357-000000000001} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EC231970-6AFD-4215-A72E-97242BB08680}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\WbemScripting.SWbemNamedValueSet.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7B31DF9-D515-11D3-A11C-00105A1F515A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{04963311-C399-408E-AD51-05D01506EED0} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FD209E2E-813B-41C0-8646-4C3E9C917511} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WbemScripting.SWbemRefresher\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{37196B39-CCCF-11D2-B35C-00105A1F8177} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C49E32C6-BC8B-11D2-85D4-00105A1F8304} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1CFABA8C-1523-11D1-AD79-00C04FD8FDFF}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\JobObjectProv.JobObjectProv\CurVer\ = "JobObjectProv.JobObjectProv.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JobObjSecLimitInfoProv.JobObjSecLimitInfoProv\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A571F412-E3D2-4A32-BF42-1D3B2203FF17}\TypeLib\ = "{0438D53A-9A57-423C-9E54-9612C4576257}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WbemScripting.SWbemSink\CurVer\ = "WbemScripting.SWbemSink.1" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000_Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEC1B0AC-5808-4033-A915-C0185934581E}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35B78F79-B973-48C8-A045-CAEC732A35D5}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4DE225BF-CF59-4CFC-85F7-68B90F185355}\NotInsertable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WbemScripting.SWbemNamedValueSet\ = "WBEM Scripting Named Value Collection" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1B55910-8BA0-47A5-A16E-2B733B1D987C}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F0E4EDDE-475A-498A-93D7-D4347F68A8F3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B60EF4F1-A411-462B-B51E-477CBDBB90B4}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\software\classes\CLSID\{4590F812-1D3A-11D0-891F-00AA004B2E24}\Implemented Categories\{00000003-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{71285C44-1DC0-11D2-B5FB-00104B703EFD} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{D269BF5C-D9C1-11D3-B38F-00105A1F473A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2A504CA2-CA90-4731-87BC-6E99CA2019AF}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JobObjIOActgInfoProv.JobObjIOActgInfoProv\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\JobObjIOActgInfoProv.JobObjIOActgInfoProv.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{523A581F-EC58-40CE-99D3-36BF7897F3EC}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{C10B4771-4DA0-11D2-A2F5-00C04F86FB7D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5791BC26-CE9C-11D1-97BF-0000F81E849C}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{755F9DA6-7508-11D1-AD94-00C04FD8FDFF}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C9273E0-1DC3-11D3-B364-00105A1F8177}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{1F87137D-0E7C-44D5-8C73-4EFFB68962F2} WmiPrvSE.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{D63A5850-8F16-11CF-9F47-00AA00BF345C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{33831ED4-42B8-11D2-93AD-00805F853771} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{55F7B88D-A254-4B22-B7BB-FCDBBA1AFA32}\TypeLib\ = "{0438D53A-9A57-423C-9E54-9612C4576257}" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D215781D-019E-4FA0-903D-0CDCDE13A4F5}\LaunchPermission = 010004804800000054000000000000001400000002003400020000000100180001000000010200000000000520000000210200000000140001000000010100000000000512000000010100000000000512000000010100000000000512000000 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F55C5B4C-517D-11D1-AB57-00C04FD9159E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9AED384E-CE8B-11D1-8B05-00600806D9B6}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{72967903-68EC-11D0-B729-00AA0062CBB7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AC9EA02A-2C8A-4ACD-B562-D7E8EBEE8E8E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BAC6B661-167E-4957-AD77-286AB256585E}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41AA40E6-2FBA-4E80-ADE9-34306567206D}\ProxyStubClsid32 regsvr32.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Peki_Spoofer_V4.exe:Zone.Identifier firefox.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
chrome.exemsedge.exemsedge.exemsedge.exemsedge.exeidentity_helper.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exepid process 2988 chrome.exe 2988 chrome.exe 5316 msedge.exe 5316 msedge.exe 568 msedge.exe 568 msedge.exe 5864 msedge.exe 5864 msedge.exe 6056 msedge.exe 6056 msedge.exe 5760 identity_helper.exe 5760 identity_helper.exe 6548 DevManView.exe 6548 DevManView.exe 6532 DevManView.exe 6532 DevManView.exe 4600 DevManView.exe 4600 DevManView.exe 4588 DevManView.exe 4588 DevManView.exe 2916 DevManView.exe 2916 DevManView.exe 3384 DevManView.exe 3384 DevManView.exe 6560 DevManView.exe 6560 DevManView.exe 2672 DevManView.exe 2672 DevManView.exe 6568 DevManView.exe 6568 DevManView.exe 2408 DevManView.exe 2408 DevManView.exe 3676 DevManView.exe 3676 DevManView.exe 4792 DevManView.exe 4792 DevManView.exe 4652 DevManView.exe 4652 DevManView.exe 6588 DevManView.exe 6588 DevManView.exe 6636 DevManView.exe 6636 DevManView.exe -
Suspicious behavior: LoadsDriver 10 IoCs
Processes:
pid process 684 684 684 684 684 684 684 684 684 684 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
Processes:
chrome.exemsedge.exepid process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeCreatePagefilePrivilege 2988 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
Processes:
chrome.exefirefox.exemsedge.exepid process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
chrome.exefirefox.exemsedge.exepid process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe 568 msedge.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
Processes:
firefox.exePeki_Spoofer_V4.exePeki_Spoofer_V4.exeidentity_helper.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeDevManView.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exeAMIDEWINx64.exepid process 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 3424 firefox.exe 1688 Peki_Spoofer_V4.exe 4264 Peki_Spoofer_V4.exe 5760 identity_helper.exe 6532 DevManView.exe 6548 DevManView.exe 4600 DevManView.exe 4588 DevManView.exe 2916 DevManView.exe 3384 DevManView.exe 6560 DevManView.exe 2672 DevManView.exe 6568 DevManView.exe 2408 DevManView.exe 3676 DevManView.exe 4792 DevManView.exe 4652 DevManView.exe 6588 DevManView.exe 6636 DevManView.exe 6684 AMIDEWINx64.exe 412 AMIDEWINx64.exe 1180 AMIDEWINx64.exe 4412 AMIDEWINx64.exe 4760 AMIDEWINx64.exe 3572 AMIDEWINx64.exe 252 AMIDEWINx64.exe 248 AMIDEWINx64.exe 3048 AMIDEWINx64.exe 2296 AMIDEWINx64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Peki Spoofer V4.execmd.exechrome.exedescription pid process target process PID 4656 wrote to memory of 2036 4656 Peki Spoofer V4.exe cmd.exe PID 4656 wrote to memory of 2036 4656 Peki Spoofer V4.exe cmd.exe PID 2036 wrote to memory of 3900 2036 cmd.exe certutil.exe PID 2036 wrote to memory of 3900 2036 cmd.exe certutil.exe PID 2036 wrote to memory of 2784 2036 cmd.exe find.exe PID 2036 wrote to memory of 2784 2036 cmd.exe find.exe PID 2036 wrote to memory of 4412 2036 cmd.exe find.exe PID 2036 wrote to memory of 4412 2036 cmd.exe find.exe PID 4656 wrote to memory of 2360 4656 Peki Spoofer V4.exe cmd.exe PID 4656 wrote to memory of 2360 4656 Peki Spoofer V4.exe cmd.exe PID 4656 wrote to memory of 2752 4656 Peki Spoofer V4.exe cmd.exe PID 4656 wrote to memory of 2752 4656 Peki Spoofer V4.exe cmd.exe PID 4656 wrote to memory of 5108 4656 Peki Spoofer V4.exe cmd.exe PID 4656 wrote to memory of 5108 4656 Peki Spoofer V4.exe cmd.exe PID 2988 wrote to memory of 4292 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 4292 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1496 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1892 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 1892 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe PID 2988 wrote to memory of 2540 2988 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Peki Spoofer V4.exe"C:\Users\Admin\AppData\Local\Temp\Peki Spoofer V4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Peki Spoofer V4.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Peki Spoofer V4.exe" MD53⤵PID:3900
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2784
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2360
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 52⤵PID:2752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffe8ccdab58,0x7ffe8ccdab68,0x7ffe8ccdab782⤵PID:4292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:22⤵PID:1496
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:1892
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:2540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:12⤵PID:472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:12⤵PID:2872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3492 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:12⤵PID:4480
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4316 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:2488
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4364 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:2092
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:1188
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4440 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:4056
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4480 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:82⤵PID:3556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4692 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:12⤵PID:4872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3376 --field-trial-handle=1744,i,10634657235060286548,671162046993430370,131072 /prefetch:12⤵PID:3896
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3708
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2388
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.0.271529817\1128449482" -parentBuildID 20230214051806 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {273f87e1-00b7-4aa0-bced-3de8ee9e928d} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 1848 24a56d15258 gpu3⤵PID:3892
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.1.1192983663\1507014158" -parentBuildID 20230214051806 -prefsHandle 2360 -prefMapHandle 2356 -prefsLen 22110 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87f40d77-715e-420c-8a17-83768f3a99e1} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 2372 24a4a088d58 socket3⤵
- Checks processor information in registry
PID:2784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.2.368476016\866703993" -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 3080 -prefsLen 22148 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dbf44ec6-b982-48f1-b7b7-ee2f9fe02a50} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 3052 24a596fca58 tab3⤵PID:3348
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.3.1968064196\1691590406" -childID 2 -isForBrowser -prefsHandle 3564 -prefMapHandle 3560 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c353e9c0-3dde-42d6-8817-fb7a7e0f4cea} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 924 24a4a079658 tab3⤵PID:3680
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.4.1926561192\1933987888" -childID 3 -isForBrowser -prefsHandle 5280 -prefMapHandle 5276 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {889ef764-b7f8-405c-8859-7657c997cbef} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5264 24a5f213958 tab3⤵PID:2932
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.5.576684673\1315822649" -childID 4 -isForBrowser -prefsHandle 5360 -prefMapHandle 5364 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80193b78-4bf0-4aa8-8ded-c1bfb0527ee9} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5352 24a5f379858 tab3⤵PID:3852
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.6.1968222787\256711007" -childID 5 -isForBrowser -prefsHandle 5412 -prefMapHandle 5244 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1fc618a2-1cf2-459f-a64c-f4551d549bda} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5400 24a5f377d58 tab3⤵PID:3700
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.7.1523459742\1276255425" -childID 6 -isForBrowser -prefsHandle 5412 -prefMapHandle 5588 -prefsLen 27695 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29575188-bacf-40a8-856f-d13b4f6e6109} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5804 24a5fe99c58 tab3⤵PID:2188
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.8.639387566\267547732" -childID 7 -isForBrowser -prefsHandle 6308 -prefMapHandle 3452 -prefsLen 27774 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf61df23-3f68-4efa-872e-69d98fca3425} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 6280 24a5c4c9c58 tab3⤵PID:2752
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.9.147390476\331605548" -parentBuildID 20230214051806 -prefsHandle 6320 -prefMapHandle 6556 -prefsLen 27774 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {325d8cad-d4d4-4b52-b941-94156743cc49} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 6576 24a5fe7fe58 rdd3⤵PID:4140
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.10.1511155658\679773157" -parentBuildID 20230214051806 -sandboxingKind 1 -prefsHandle 6568 -prefMapHandle 6564 -prefsLen 27774 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ea51ee4-0068-473c-a2cb-42181ed67b91} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 6592 24a5fe9a558 utility3⤵PID:4916
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.11.1152539058\1501336841" -childID 8 -isForBrowser -prefsHandle 5336 -prefMapHandle 5268 -prefsLen 28039 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37b4acd1-3f70-4b4a-931f-786dec2e9b2d} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5540 24a59660758 tab3⤵PID:4772
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.12.1017778682\1296452238" -childID 9 -isForBrowser -prefsHandle 6832 -prefMapHandle 2996 -prefsLen 28039 -prefMapSize 235121 -jsInitHandle 1296 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1647acf-6304-4ab0-b9e9-185d413c8e1b} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5268 24a5b6bb058 tab3⤵PID:2104
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3424.13.1859321061\381314250" -parentBuildID 20230214051806 -sandboxingKind 0 -prefsHandle 5496 -prefMapHandle 6104 -prefsLen 28175 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {739af0f5-f286-439b-8234-e0b8a51ca5b0} 3424 "\\.\pipe\gecko-crash-server-pipe.3424" 5568 24a5e8afa58 utility3⤵PID:868
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004DC1⤵PID:4072
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4940
-
C:\Users\Admin\Downloads\Peki_Spoofer_V4.exe"C:\Users\Admin\Downloads\Peki_Spoofer_V4.exe"1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\Downloads\Peki_Spoofer_V4.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵PID:4620
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\Downloads\Peki_Spoofer_V4.exe" MD53⤵PID:1496
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:4200
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:3740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2864
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 52⤵PID:2632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\INF\Peki_Spoofer_V4.exe2⤵PID:4836
-
C:\Windows\INF\Peki_Spoofer_V4.exeC:\Windows\INF\Peki_Spoofer_V4.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4264 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title Peki Spoofer V44⤵PID:4200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 1f4⤵PID:568
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/akfDT6Gb8K4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffe7a343cb8,0x7ffe7a343cc8,0x7ffe7a343cd85⤵PID:2868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1872 /prefetch:25⤵PID:5300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:85⤵PID:5416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:15⤵PID:5608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:15⤵PID:5616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:15⤵PID:6044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5232 /prefetch:85⤵PID:5840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5216 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:6056 -
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:15⤵PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:15⤵PID:5616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:15⤵PID:1944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,5518764155973309625,8347246835655281308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:15⤵PID:6084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2836
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color f4⤵PID:5136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:5868
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get model, serialnumber4⤵PID:5884
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get model, serialnumber5⤵PID:5756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic bios get serialnumber4⤵PID:6140
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber5⤵PID:4540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic baseboard get serialnumber4⤵PID:1148
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber5⤵PID:5468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c getmac4⤵PID:5620
-
C:\Windows\system32\getmac.exegetmac5⤵PID:5632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:6068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color f4⤵PID:6048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:6256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKLM\SOFTWARE\Microsoft\Cryptography" /v MachineGuid /t REG_SZ /d "f0ff5e34-dbfa-bdb1-2717c125c5fe875b" /f4⤵PID:6416
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Cryptography" /v MachineGuid /t REG_SZ /d "f0ff5e34-dbfa-bdb1-2717c125c5fe875b" /f5⤵PID:6452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\IDconfigDB\Hardware Profiles\0001" /v HwProfileGuid /t REG_SZ /d "{f0ff5e34-dbfa-bdb1-2717c125c5fe875b"} /f4⤵PID:7004
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SYSTEM\CurrentControlSet\Control\IDconfigDB\Hardware Profiles\0001" /v HwProfileGuid /t REG_SZ /d "{f0ff5e34-dbfa-bdb1-2717c125c5fe875b"} /f5⤵PID:7020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v NetworkAddress /t REG_SZ /d "7f3233615dca" /f4⤵PID:6416
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001" /v NetworkAddress /t REG_SZ /d "7f3233615dca" /f5⤵PID:6452
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\INF\dr43.exe4⤵PID:6484
-
C:\Windows\INF\dr43.exeC:\Windows\INF\dr43.exe5⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\lol.bat6⤵PID:6520
-
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "WAN Miniport*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6532 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "Disk drive*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6548 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "C:\"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4600 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "D:\"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "E:\"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "F:\"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "G:\"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6560 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "Disk"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6568 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "disk"7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "Disk&*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "SWD\WPDBUSENUM*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3676 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "USBSTOR*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "SCSI\Disk*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4652 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "STORAGE*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6588 -
C:\ProgramData\Microsoft\Windows\DevManView.exeDevManView.exe /uninstall "WAN Miniport*" /use_wildcard""7⤵
- Executes dropped EXE
- Enumerates connected drives
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6636 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS %RANDOM%PR-WARE%RANDOM%SS6⤵PID:6668
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SS 15370PR-WARE2751SS7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6684 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 2%RANDOM%PR-WARE%RANDOM%SV6⤵PID:2872
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SV 215370PR-WARE2751SV7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 8%RANDOM%PR-WARE%RANDOM%SV6⤵PID:6712
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 815370PR-WARE2751SV7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto6⤵PID:3588
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SU auto7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 5%RANDOM%PR-WARE%RANDOM%SK6⤵PID:3256
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SK 515370PR-WARE2751SK7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 4%RANDOM%PR-WARE%RANDOM%BM6⤵PID:2700
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BM 415370PR-WARE2751BM7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3572 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 6%RANDOM%PR-WARE%RANDOM%BS6⤵PID:2108
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BS 615373PR-WARE13499BS7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:252 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 3%RANDOM%PR-WARE%RANDOM%BV6⤵PID:4248
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /BV 315373PR-WARE13499BV7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:248 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 7%RANDOM%PR-WARE%RANDOM%PSN6⤵PID:3144
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /PSN 715373PR-WARE13499PSN7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM Costa-Tech-Support6⤵PID:992
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeC:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe /SM Costa-Tech-Support7⤵
- Cerber
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exe6⤵PID:4516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\amide.sys6⤵PID:4936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\amifldrv64.sys6⤵PID:6720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM DevManView.exe /F6⤵PID:6736
-
C:\Windows\system32\taskkill.exetaskkill /IM DevManView.exe /F7⤵
- Kills process with taskkill
PID:6752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\DevManView.exe6⤵PID:2104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\DevManView.cfg6⤵PID:3168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\DevManView.chm6⤵PID:776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del C:\ProgramData\Microsoft\Windows\lol.bat6⤵PID:1504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:1372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:3612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color f4⤵PID:852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get model, serialnumber4⤵PID:6812
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get model, serialnumber5⤵PID:6824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic bios get serialnumber4⤵PID:2344
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber5⤵PID:6860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic baseboard get serialnumber4⤵PID:6896
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber5⤵PID:3724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c getmac4⤵PID:3488
-
C:\Windows\system32\getmac.exegetmac5⤵PID:3112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:1304
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color f4⤵PID:3632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:2776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\INF\FNCLEAN.bat4⤵PID:6608
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"5⤵PID:6920
-
C:\Windows\system32\taskkill.exetaskkill /f /im epicgameslauncher.exe5⤵
- Cerber
- Kills process with taskkill
PID:1404 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_EAC.exe5⤵
- Cerber
- Kills process with taskkill
PID:6908 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping_BE.exe5⤵
- Cerber
- Kills process with taskkill
PID:2028 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteLauncher.exe5⤵
- Cerber
- Kills process with taskkill
PID:4568 -
C:\Windows\system32\taskkill.exetaskkill /f /im OneDrive.exe5⤵
- Cerber
- Kills process with taskkill
PID:5052 -
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe5⤵
- Cerber
- Kills process with taskkill
PID:2084 -
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe5⤵
- Cerber
- Kills process with taskkill
PID:4328 -
C:\Windows\system32\taskkill.exetaskkill /f /im UnrealCEFSubProcess.exe5⤵
- Cerber
- Kills process with taskkill
PID:1036 -
C:\Windows\system32\taskkill.exetaskkill /f /im CEFProcess.exe5⤵
- Cerber
- Kills process with taskkill
PID:3872 -
C:\Windows\system32\taskkill.exetaskkill /f /im EasyAntiCheat.exe5⤵
- Cerber
- Kills process with taskkill
PID:4948 -
C:\Windows\system32\taskkill.exetaskkill /f /im BEService.exe5⤵
- Cerber
- Kills process with taskkill
PID:2156 -
C:\Windows\system32\taskkill.exetaskkill /f /im BEServices.exe5⤵
- Cerber
- Kills process with taskkill
PID:1816 -
C:\Windows\system32\taskkill.exetaskkill /f /im BattleEye.exe5⤵
- Cerber
- Kills process with taskkill
PID:656 -
C:\Windows\system32\sc.exeSc stop EasyAntiCheat5⤵
- Launches sc.exe
PID:4228 -
C:\Windows\system32\sc.exeSc stop FortniteClient-Win64-Shipping_EAC5⤵
- Launches sc.exe
PID:1692 -
C:\Windows\system32\sc.exeSc stop BattleEye5⤵
- Launches sc.exe
PID:1092 -
C:\Windows\system32\sc.exeSc stop FortniteClient-Win64-Shipping_BE5⤵
- Launches sc.exe
PID:4840 -
C:\Windows\system32\sc.exesc config winmgmt start= disabled5⤵
- Launches sc.exe
PID:3768 -
C:\Windows\system32\net.exenet stop winmgmt /y5⤵PID:3080
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop winmgmt /y6⤵PID:4192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b *.dll5⤵PID:2832
-
C:\Windows\system32\regsvr32.exeregsvr32 /s appbackgroundtask.dll5⤵PID:400
-
C:\Windows\system32\regsvr32.exeregsvr32 /s cimwin32.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:4560 -
C:\Windows\system32\regsvr32.exeregsvr32 /s DMWmiBridgeProv.dll5⤵PID:2244
-
C:\Windows\system32\regsvr32.exeregsvr32 /s DMWmiBridgeProv1.dll5⤵PID:1392
-
C:\Windows\system32\regsvr32.exeregsvr32 /s dnsclientcim.dll5⤵PID:1736
-
C:\Windows\system32\regsvr32.exeregsvr32 /s dnsclientpsprovider.dll5⤵PID:6068
-
C:\Windows\system32\regsvr32.exeregsvr32 /s Dscpspluginwkr.dll5⤵PID:3788
-
C:\Windows\system32\regsvr32.exeregsvr32 /s dsprov.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:7032 -
C:\Windows\system32\regsvr32.exeregsvr32 /s EmbeddedLockdownWmi.dll5⤵PID:7008
-
C:\Windows\system32\regsvr32.exeregsvr32 /s esscli.dll5⤵
- Registers COM server for autorun
PID:1440 -
C:\Windows\system32\regsvr32.exeregsvr32 /s EventTracingManagement.dll5⤵PID:5936
-
C:\Windows\system32\regsvr32.exeregsvr32 /s fastprox.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:7080 -
C:\Windows\system32\regsvr32.exeregsvr32 /s ipmiprr.dll5⤵PID:7096
-
C:\Windows\system32\regsvr32.exeregsvr32 /s ipmiprv.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:7128 -
C:\Windows\system32\regsvr32.exeregsvr32 /s KrnlProv.dll5⤵PID:7108
-
C:\Windows\system32\regsvr32.exeregsvr32 /s MDMAppProv.dll5⤵PID:5260
-
C:\Windows\system32\regsvr32.exeregsvr32 /s MDMSettingsProv.dll5⤵PID:7156
-
C:\Windows\system32\regsvr32.exeregsvr32 /s Microsoft.AppV.AppVClientWmi.dll5⤵PID:5376
-
C:\Windows\system32\regsvr32.exeregsvr32 /s Microsoft.Uev.AgentWmi.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:6164 -
C:\Windows\system32\regsvr32.exeregsvr32 /s MMFUtil.dll5⤵PID:6180
-
C:\Windows\system32\regsvr32.exeregsvr32 /s mofd.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:6196 -
C:\Windows\system32\regsvr32.exeregsvr32 /s mofinstall.dll5⤵PID:6212
-
C:\Windows\system32\regsvr32.exeregsvr32 /s msdtcwmi.dll5⤵PID:6276
-
C:\Windows\system32\regsvr32.exeregsvr32 /s msiprov.dll5⤵PID:6048
-
C:\Windows\system32\regsvr32.exeregsvr32 /s NCProv.dll5⤵PID:6076
-
C:\Windows\system32\regsvr32.exeregsvr32 /s ndisimplatcim.dll5⤵PID:6148
-
C:\Windows\system32\regsvr32.exeregsvr32 /s NetAdapterCim.dll5⤵PID:6248
-
C:\Windows\system32\regsvr32.exeregsvr32 /s netdacim.dll5⤵PID:6176
-
C:\Windows\system32\regsvr32.exeregsvr32 /s NetEventPacketCapture.dll5⤵PID:5684
-
C:\Windows\system32\regsvr32.exeregsvr32 /s netnccim.dll5⤵PID:5696
-
C:\Windows\system32\regsvr32.exeregsvr32 /s NetPeerDistCim.dll5⤵PID:5712
-
C:\Windows\system32\regsvr32.exeregsvr32 /s netswitchteamcim.dll5⤵PID:5952
-
C:\Windows\system32\regsvr32.exeregsvr32 /s NetTCPIP.dll5⤵PID:5796
-
C:\Windows\system32\regsvr32.exeregsvr32 /s netttcim.dll5⤵PID:5292
-
C:\Windows\system32\regsvr32.exeregsvr32 /s nlmcim.dll5⤵PID:5360
-
C:\Windows\system32\regsvr32.exeregsvr32 /s ntevt.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:1216 -
C:\Windows\system32\regsvr32.exeregsvr32 /s PolicMan.dll5⤵PID:364
-
C:\Windows\system32\regsvr32.exeregsvr32 /s PrintManagementProvider.dll5⤵PID:3108
-
C:\Windows\system32\regsvr32.exeregsvr32 /s qoswmi.dll5⤵PID:5732
-
C:\Windows\system32\regsvr32.exeregsvr32 /s RacWmiProv.dll5⤵PID:5584
-
C:\Windows\system32\regsvr32.exeregsvr32 /s repdrvfs.dll5⤵
- Registers COM server for autorun
PID:5620 -
C:\Windows\system32\regsvr32.exeregsvr32 /s schedprov.dll5⤵PID:5616
-
C:\Windows\system32\regsvr32.exeregsvr32 /s ServDeps.dll5⤵PID:6260
-
C:\Windows\system32\regsvr32.exeregsvr32 /s SMTPCons.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:6296 -
C:\Windows\system32\regsvr32.exeregsvr32 /s stdprov.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:6116 -
C:\Windows\system32\regsvr32.exeregsvr32 /s vdswmi.dll5⤵
- Registers COM server for autorun
PID:6320 -
C:\Windows\system32\regsvr32.exeregsvr32 /s viewprov.dll5⤵PID:6324
-
C:\Windows\system32\regsvr32.exeregsvr32 /s vpnclientpsprovider.dll5⤵PID:1276
-
C:\Windows\system32\regsvr32.exeregsvr32 /s vsswmi.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:6356 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemcntl.dll5⤵
- Registers COM server for autorun
PID:5320 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemcons.dll5⤵
- Modifies registry class
PID:5324 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemcore.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:5352 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemdisp.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:5656 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemess.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:6384 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemprox.dll5⤵
- Registers COM server for autorun
PID:3028 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wbemsvc.dll5⤵
- Modifies registry class
PID:5196 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WdacWmiProv.dll5⤵PID:6412
-
C:\Windows\system32\regsvr32.exeregsvr32 /s wfascim.dll5⤵PID:6432
-
C:\Windows\system32\regsvr32.exeregsvr32 /s Win32_EncryptableVolume.dll5⤵PID:6464
-
C:\Windows\system32\regsvr32.exeregsvr32 /s Win32_Tpm.dll5⤵PID:1284
-
C:\Windows\system32\regsvr32.exeregsvr32 /s WinMgmtR.dll5⤵PID:5748
-
C:\Windows\system32\regsvr32.exeregsvr32 /s WmiApRes.dll5⤵PID:5916
-
C:\Windows\system32\regsvr32.exeregsvr32 /s WmiApRpl.dll5⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5604 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WMICOOKR.dll5⤵PID:5828
-
C:\Windows\system32\regsvr32.exeregsvr32 /s WmiDcPrv.dll5⤵
- Registers COM server for autorun
PID:5592 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wmipcima.dll5⤵
- Registers COM server for autorun
PID:5840 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wmipdfs.dll5⤵PID:1464
-
C:\Windows\system32\regsvr32.exeregsvr32 /s wmipdskq.dll5⤵PID:6084
-
C:\Windows\system32\regsvr32.exeregsvr32 /s WmiPerfClass.dll5⤵
- Registers COM server for autorun
PID:2636 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WmiPerfInst.dll5⤵
- Registers COM server for autorun
PID:4844 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WMIPICMP.dll5⤵
- Registers COM server for autorun
PID:6476 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WMIPIPRT.dll5⤵
- Registers COM server for autorun
PID:6436 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WMIPJOBJ.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:2440 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wmiprov.dll5⤵
- Modifies registry class
PID:6500 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WmiPrvSD.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:816 -
C:\Windows\system32\regsvr32.exeregsvr32 /s WMIPSESS.dll5⤵PID:6544
-
C:\Windows\system32\regsvr32.exeregsvr32 /s WMIsvc.dll5⤵
- Sets DLL path for service in the registry
- Modifies registry class
PID:3608 -
C:\Windows\system32\regsvr32.exeregsvr32 /s wmitimep.dll5⤵PID:2020
-
C:\Windows\system32\regsvr32.exeregsvr32 /s wmiutils.dll5⤵
- Registers COM server for autorun
- Modifies registry class
PID:4492 -
C:\Windows\System32\wbem\WmiPrvSE.exewmiprvse /regserver5⤵
- Modifies registry class
PID:6540 -
C:\Windows\System32\wbem\WinMgmt.exewinmgmt /regserver5⤵PID:2076
-
C:\Windows\system32\sc.exesc config winmgmt start= auto5⤵
- Launches sc.exe
PID:3880 -
C:\Windows\system32\net.exenet start winmgmt5⤵PID:3248
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start winmgmt6⤵PID:6548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /s /b *.mof *.mfl5⤵PID:6568
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\aeinv.mof5⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\AgentWmi.mof5⤵
- Drops file in System32 directory
PID:4964 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\AgentWmiUninstall.mof5⤵
- Drops file in System32 directory
PID:3308 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\appbackgroundtask.mof5⤵PID:2712
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\appbackgroundtask_uninstall.mof5⤵PID:4944
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\AuditRsop.mof5⤵PID:1552
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\authfwcfg.mof5⤵PID:2108
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\bcd.mof5⤵PID:1380
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\BthMtpEnum.mof5⤵PID:6732
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\cimdmtf.mof5⤵
- Drops file in System32 directory
PID:6764 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\cimwin32.mof5⤵
- Drops file in System32 directory
PID:6792 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\CIWmi.mof5⤵
- Drops file in System32 directory
PID:1504 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\classlog.mof5⤵PID:2980
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\cli.mof5⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\cliegaliases.mof5⤵PID:6824
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ddp.mof5⤵
- Drops file in System32 directory
PID:6860 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dimsjob.mof5⤵PID:3724
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dimsroam.mof5⤵PID:4848
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DMWmiBridgeProv.mof5⤵PID:4584
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DMWmiBridgeProv1.mof5⤵
- Drops file in System32 directory
PID:1068 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DMWmiBridgeProv1_Uninstall.mof5⤵PID:2992
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DMWmiBridgeProv_Uninstall.mof5⤵PID:6948
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dnsclientcim.mof5⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dnsclientpsprovider.mof5⤵
- Drops file in System32 directory
PID:3548 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dnsclientpsprovider_Uninstall.mof5⤵PID:336
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\drvinst.mof5⤵PID:4628
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DscCore.mof5⤵PID:6960
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DscCoreConfProv.mof5⤵
- Drops file in System32 directory
PID:4140 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dscproxy.mof5⤵
- Drops file in System32 directory
PID:6620 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\DscTimer.mof5⤵PID:3480
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\dsprov.mof5⤵
- Drops file in System32 directory
PID:6984 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\eaimeapi.mof5⤵PID:1640
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\embeddedlockdownwmi.mof5⤵PID:2752
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\embeddedlockdownwmi_Uninstall.mof5⤵PID:5184
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\EventTracingManagement.mof5⤵
- Drops file in System32 directory
PID:5140 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\fdPHost.mof5⤵PID:1680
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\fdrespub.mof5⤵PID:4048
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\fdSSDP.mof5⤵PID:4572
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\fdWNet.mof5⤵PID:4112
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\fdWSD.mof5⤵PID:2188
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\filetrace.mof5⤵PID:7020
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\firewallapi.mof5⤵PID:7092
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\FolderRedirectionWMIProvider.mof5⤵
- Drops file in System32 directory
PID:7120 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\FunDisc.mof5⤵PID:7160
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\fwcfg.mof5⤵PID:6092
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\hbaapi.mof5⤵PID:6196
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\hnetcfg.mof5⤵
- Drops file in System32 directory
PID:6044 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\IMAPIv2-Base.mof5⤵PID:7036
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\IMAPIv2-FileSystemSupport.mof5⤵PID:5708
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\IMAPIv2-LegacyShim.mof5⤵PID:5664
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\interop.mof5⤵
- Drops file in System32 directory
PID:5292 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\IpmiDTrc.mof5⤵PID:4540
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ipmiprv.mof5⤵
- Drops file in System32 directory
PID:5472 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\IpmiPTrc.mof5⤵PID:6300
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ipsecsvc.mof5⤵PID:6116
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\iscsidsc.mof5⤵
- Drops file in System32 directory
PID:6344 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\iscsihba.mof5⤵
- Drops file in System32 directory
PID:5836 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\iscsiprf.mof5⤵PID:6364
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\iscsirem.mof5⤵PID:3028
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\iscsiwmiv2.mof5⤵
- Drops file in System32 directory
PID:6412 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\iscsiwmiv2_uninstall.mof5⤵PID:5876
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\kerberos.mof5⤵PID:5916
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\krnlprov.mof5⤵
- Drops file in System32 directory
PID:5944 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\L2SecHC.mof5⤵
- Drops file in System32 directory
PID:5964 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\lltdio.mof5⤵PID:5240
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\lltdsvc.mof5⤵PID:5272
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\lsasrv.mof5⤵PID:5264
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mblctr.mof5⤵PID:5336
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\MDMAppProv.mof5⤵PID:5832
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\MDMAppProv_Uninstall.mof5⤵
- Drops file in System32 directory
PID:6084 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\MDMSettingsProv.mof5⤵PID:6476
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\MDMSettingsProv_Uninstall.mof5⤵PID:6504
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\Microsoft-Windows-OfflineFiles.mof5⤵PID:2996
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\Microsoft-Windows-Remote-FileSystem.mof5⤵PID:4056
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\Microsoft.AppV.AppVClientWmi.mof5⤵
- Drops file in System32 directory
PID:912 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\Microsoft.Uev.ManagedAgentWmi.mof5⤵
- Drops file in System32 directory
PID:748 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\Microsoft.Uev.ManagedAgentWmiUninstall.mof5⤵PID:6688
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mispace.mof5⤵PID:1932
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mispace_uninstall.mof5⤵PID:1572
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mmc.mof5⤵PID:4556
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mountmgr.mof5⤵PID:1172
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mpeval.mof5⤵PID:2792
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mpsdrv.mof5⤵PID:3136
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mpssvc.mof5⤵PID:4824
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\MsDtcWmi.mof5⤵
- Drops file in System32 directory
PID:6724 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\msfeeds.mof5⤵PID:6756
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\msfeedsbs.mof5⤵PID:1756
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\msi.mof5⤵PID:6752
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\msiscsi.mof5⤵PID:232
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\MsNetImPlatform.mof5⤵
- Drops file in System32 directory
PID:4604 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mstsc.mof5⤵PID:6812
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mstscax.mof5⤵PID:2344
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\msv1_0.mof5⤵PID:6896
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\mswmdm.mof5⤵PID:200
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ncprov.mof5⤵
- Drops file in System32 directory
PID:1836 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ncsi.mof5⤵PID:3404
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ndistrace.mof5⤵PID:4624
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetAdapterCim.mof5⤵PID:6904
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetAdapterCimTrace.mof5⤵
- Drops file in System32 directory
PID:2028 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetAdapterCimTraceUninstall.mof5⤵PID:2368
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetAdapterCim_uninstall.mof5⤵PID:2084
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netdacim.mof5⤵
- Drops file in System32 directory
PID:3860 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netdacim_uninstall.mof5⤵PID:796
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetEventPacketCapture.mof5⤵
- Drops file in System32 directory
PID:3084 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetEventPacketCapture_uninstall.mof5⤵PID:868
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netnccim.mof5⤵PID:1692
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netnccim_uninstall.mof5⤵PID:3088
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetPeerDistCim.mof5⤵
- Drops file in System32 directory
PID:924 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetPeerDistCim_uninstall.mof5⤵PID:4772
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netprofm.mof5⤵PID:5144
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetSwitchTeam.mof5⤵
- Drops file in System32 directory
PID:5228 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetTCPIP.mof5⤵PID:2652
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\NetTCPIP_Uninstall.mof5⤵PID:2832
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netttcim.mof5⤵PID:400
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\netttcim_uninstall.mof5⤵PID:6936
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\networkitemfactory.mof5⤵PID:4728
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\newdev.mof5⤵PID:7032
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\nlasvc.mof5⤵PID:7008
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\nlmcim.mof5⤵PID:7096
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\nlmcim_uninstall.mof5⤵PID:6228
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\nlsvc.mof5⤵PID:2068
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\npivwmi.mof5⤵PID:6164
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\nshipsec.mof5⤵PID:6220
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ntevt.mof5⤵
- Drops file in System32 directory
PID:6160 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ntfs.mof5⤵PID:5612
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\OfflineFilesConfigurationWmiProvider.mof5⤵
- Drops file in System32 directory
PID:5720 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\OfflineFilesConfigurationWmiProvider_Uninstall.mof5⤵PID:5952
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\OfflineFilesWmiProvider.mof5⤵PID:6064
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\OfflineFilesWmiProvider_Uninstall.mof5⤵PID:6136
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\p2p-mesh.mof5⤵PID:6240
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\p2p-pnrp.mof5⤵PID:6296
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\pcsvDevice.mof5⤵PID:6328
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\pcsvDevice_Uninstall.mof5⤵PID:5352
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\PNPXAssoc.mof5⤵PID:5836
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\PolicMan.mof5⤵
- Drops file in System32 directory
PID:6384 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\polproc.mof5⤵PID:6400
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\polprocl.mof5⤵PID:6020
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\polprou.mof5⤵PID:5648
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\polstore.mof5⤵PID:7048
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\portabledeviceapi.mof5⤵PID:5488
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\portabledeviceclassextension.mof5⤵PID:5160
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\portabledeviceconnectapi.mof5⤵PID:5316
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\portabledevicetypes.mof5⤵PID:5312
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\portabledevicewiacompat.mof5⤵PID:5824
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\powermeterprovider.mof5⤵
- Drops file in System32 directory
PID:1944 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\PowerPolicyProvider.mof5⤵PID:6460
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ppcRsopCompSchema.mof5⤵
- Drops file in System32 directory
PID:5176 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ppcRsopUserSchema.mof5⤵
- Drops file in System32 directory
PID:5060 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\PrintFilterPipelineSvc.mof5⤵PID:4076
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\PrintManagementProvider.mof5⤵PID:4852
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\profileassociationprovider.mof5⤵
- Drops file in System32 directory
PID:4080 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\PS_MMAgent.mof5⤵PID:6548
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\qmgr.mof5⤵PID:3384
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\qoswmi.mof5⤵PID:1592
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\qoswmitrc.mof5⤵PID:2872
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\qoswmitrc_uninstall.mof5⤵PID:4412
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\qoswmi_uninstall.mof5⤵PID:1220
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\RacWmiProv.mof5⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\rdpendp.mof5⤵
- Drops file in System32 directory
PID:392 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\rdpinit.mof5⤵PID:2796
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\rdpshell.mof5⤵PID:992
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\refs.mof5⤵PID:6592
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\refsv1.mof5⤵PID:776
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\regevent.mof5⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\Remove.Microsoft.AppV.AppvClientWmi.mof5⤵
- Drops file in System32 directory
PID:6752 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\rsop.mof5⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\rspndr.mof5⤵PID:6824
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\samsrv.mof5⤵PID:6852
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\scersop.mof5⤵
- Drops file in System32 directory
PID:3096 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\schannel.mof5⤵PID:2688
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\SchedProv.mof5⤵
- Drops file in System32 directory
PID:6528 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\scm.mof5⤵
- Drops file in System32 directory
PID:4584 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\scrcons.mof5⤵
- Drops file in System32 directory
PID:1068 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\sdbus.mof5⤵PID:2992
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\secrcw32.mof5⤵PID:4568
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\SensorsClassExtension.mof5⤵PID:2236
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ServiceModel.mof5⤵
- Drops file in System32 directory
PID:332 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\ServiceModel35.mof5⤵PID:336
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\services.mof5⤵PID:4220
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\setupapi.mof5⤵PID:6960
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\SmbWitnessWmiv2Provider.mof5⤵
- Drops file in System32 directory
PID:3448 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\smbwmiv2.mof5⤵
- Drops file in System32 directory
PID:3200 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\smtpcons.mof5⤵
- Drops file in System32 directory
PID:1052 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\sppwmi.mof5⤵PID:2972
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\sr.mof5⤵PID:5284
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\sstpsvc.mof5⤵PID:3704
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\storagewmi.mof5⤵PID:1712
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\storagewmi_passthru.mof5⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\storagewmi_passthru_uninstall.mof5⤵PID:5092
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\storagewmi_uninstall.mof5⤵PID:4880
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\stortrace.mof5⤵PID:2188
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\subscrpt.mof5⤵PID:7032
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\system.mof5⤵PID:7136
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\tcpip.mof5⤵PID:7156
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\tsallow.mof5⤵PID:6192
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\tscfgwmi.mof5⤵PID:4532
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\tsmf.mof5⤵PID:6156
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\tspkg.mof5⤵PID:5724
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\umb.mof5⤵PID:6160
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\umbus.mof5⤵PID:5612
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\umpass.mof5⤵PID:5640
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\umpnpmgr.mof5⤵PID:5952
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\UserProfileConfigurationWmiProvider.mof5⤵PID:1492
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\UserProfileWmiProvider.mof5⤵PID:5584
-
C:\Windows\System32\wbem\mofcomp.exemofcomp C:\Windows\System32\wbem\UserStateWMIProvider.mof5⤵PID:6240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
- Drops file in System32 directory
PID:4012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\AMIDEWINx64.exeFilesize
452KB
MD5c4d09d3b3516550ad2ded3b09e28c10c
SHA17a5e77bb9ba74cf57cb1d119325b0b7f64199824
SHA25666433a06884f28fdabb85a73c682d1587767e1dfa116907559ec00ed8d0919d3
SHA5122e7800aae592d38c4a6c854b11d0883de70f938b29d78e257ab47a8a2bbf09121145d0a9aea9b56c16e18cde31b693d31d7ebfcd0473b7c15df5d7ae6708bbd2
-
C:\ProgramData\Microsoft\Windows\DevManView.cfgFilesize
1KB
MD543b37d0f48bad1537a4de59ffda50ffe
SHA148ca09a0ed8533bf462a56c43b8db6e7b6c6ffa8
SHA256fc258dfb3e49be04041ac24540ef544192c2e57300186f777f301d586f900288
SHA512cfb1d98328aed36d2fe9df008a95c489192f01d4bb20de329e69e0386129aff4634e6fd63a8d49e14fc96da75c9b5ed3a218425846907d0122267d50fc8d7a82
-
C:\ProgramData\Microsoft\Windows\DevManView.exeFilesize
162KB
MD533d7a84f8ef67fd005f37142232ae97e
SHA11f560717d8038221c9b161716affb7cd6b14056e
SHA256a1be60039f125080560edf1eebee5b6d9e2d6039f5f5ac478e6273e05edadb4b
SHA512c059db769b9d8a9f1726709c9ad71e565b8081a879b55d0f906d6927409166e1d5716c784146feba41114a2cf44ee90cf2e0891831245752238f20c41590b3f5
-
C:\ProgramData\Microsoft\Windows\amifldrv64.sysFilesize
18KB
MD5785045f8b25cd2e937ddc6b09debe01a
SHA1029c678674f482ababe8bbfdb93152392457109d
SHA25637073e42ffa0322500f90cd7e3c8d02c4cdd695d31c77e81560abec20bfb68ba
SHA51240bbeb41816146c7172aa3cf27dace538908b7955171968e1cddcd84403b2588e0d8437a3596c2714ccdf4476eefa3d4e61d90ea118982b729f50b03df1104a9
-
C:\ProgramData\Microsoft\Windows\lol.batFilesize
842B
MD584c4264b5224a40cd350ba2c085e9f79
SHA180135427c7ddc08f322d714c55ebe5426bbdc102
SHA2569819406b56fed960e5c0cc62e5300a1b85845fef5a1ea4c0fd6a1aa3f3833f14
SHA5120fffa18b8e5215e8d3a222f85fe5e3de904f62353f2911db8e526716a5fbd1d9193320449815a8ad5572e6566008c2f0547a35d3de28e2fc784a5635eabe7788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
1KB
MD55bc8c77cc39ef54a0eb496a99d42524e
SHA189903d48951a4a0b96d1494cad05926881302d84
SHA2562627710dba74a12ab49217e1abebe7ed8b06ad53a9c2aa08f6b9b51255f06a4b
SHA512913ea1d25d568a296e6c4b7a50ce356ae7fc4f22a0a8a3c9cebebf5266ed554f988e0aef077b99f682768f6f6b8932de796a38d758e2556426899cff869e19a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27Filesize
408B
MD5e5b027d38fffa0122428391611dca8f4
SHA1eae5a35629467052f9525a6f73e48e3cb0e9c6d3
SHA256caf3f65d89a9026833c136a8e00e8fd400239e1b7b03c76474f5d3a54b75272a
SHA51266b53f42ea0334ed5bf245861e606f04c588797b5ac8f55a831f2b0d0c2d7d8f8060a17b0536a2d62feeebd0337fcb23b00a08e291ba9fd59e26d49309736abc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
792B
MD564a74df6a413be5ccd065274d7f91db2
SHA181134cec12a760f6c83068ce3041612ded076663
SHA2567f1cee96427c7bf484a12b4367a7be6f7e409fa94b31de331257ce5630c28f06
SHA512bd2a3600cc53288af82efe8af6e1b291e3c490fcd26db4f7f3c06460a154bd26cc200ab76dcb904e73acdea71ab49b9ab83fe29a4caa8f0f47c5e781db6e061f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5a20481a4f7ede9d8e7f961bcd1ff4c95
SHA180d224442ea121573ef71b1a0486007b4335a6b4
SHA256762d85340c740001750e454739d6757d6600e0b119e8f761bfc2f3d9dd9ed48c
SHA512145ffe5dc6f49228ed876e8fe819e795b0d78758f34a9300322561fa679f2c51e14b90b3956c775ba6bd105a4501e5d9451416176dbfce459537c22c407dc080
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD53ed84c65b3e5bc51660c100a5d3bf947
SHA1af8976ce152102837aa34dbb27087f38c24323e3
SHA256cb7f12b18e80b182142dd1c8f816b8446ce6131c7f402368ba4d425503a527af
SHA512b388fa13c449e672e3c60a7c76e1b616d8a6b4829edb2f61349a3c4ff0032e555e2c001183a7624b9993a7f2767b46ca248078d3335a8dd25fbe66b4a2e98e1a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
690B
MD5f341fd3077aa60946e54c86d1916e124
SHA1f79a25837ca2f6caae695dc59db12917e7667a26
SHA256e55f5ce81f6776e7ced0f1a44cfa702093003ce0407f5f74bd22015f6434b124
SHA512d020d06e59c9bf22b355aba110f370c17be958ffb81fd372597bbc87c8e40cadda875b442a414c4c7469d02e30e19ef1d41cb68146eeb02767b348962e72b1a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
690B
MD56424684ceb0b18c3ffd73357542d0a25
SHA1eef104740a1063a25d44a5975d26954afc41eb86
SHA256f814624ee73121ad65ce50d946585528e078efb3058166ed76867e7db0929e28
SHA5126bef23d75af63dff985b3212acf0bb5b3acb6fba789bc3ade1fb610b857ac8e59e8ac1139128e3f37831becf15fe5b6c1580f8b37e0d25ecd799052d986ed8d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
690B
MD50c98986240209bdee817eb30f4ebda82
SHA1387a0137f7d4161e0221f6da906a8b87d02d8df8
SHA25660e7099627bb776a88c98b76ac7bc731d6e57ccca75b8d6cb611814aa2d43543
SHA512278ff76144004d49f381cb1709155ad4cb8f3f98e6f9b6665ef7fbfc986e751b64225d9ee941ec59cda9ce6c5bb9554449798203620d667b7d51d7365f0aa9d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5bb06e4642213c3dad92f652deebe3673
SHA1cd53c4d54d669f16c64060160c1e91acf49b2acc
SHA2560528b4a106a74a9a077d3760500de9e07bd09eee7ee475dd1c205bb8d611cbb8
SHA512f3eee25234b1d2079970231bf9d0f4e5a59919ecd686d96bc4fa88dae37bf4d3101de16c843554bc9ba612b187ec0a27405ebc5fb254a03b2ffc09d31553c575
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5dcdf887783966510df9cb64cc9072b02
SHA1431123969a689386d5e85da2a15b00840b9ab02d
SHA256c7d1aa60b01b4350166c530c420579b91e95c3e650c3ecb617acc3d7f16c0c82
SHA512fe5acb2a378e0046d97e29ad7d30c33c487a1b1f6005687a33fbbc80fe0129b899bbdd9055034a15d0be21445608b3453e7ee6ca797ceb58ea671c43fee2078c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54aa5b0bb89bbd79d2192ccc14afc72cf
SHA19640c8f8cee69b112c8159a6bca03560c494fa2e
SHA256ddbf1a4e9550a2c2b5403f41e4ce11dd23755d83ead108c06bba859e3743c28a
SHA512e9bcc581948ad80ecc8a2d8f23adbe518c482fc40b288d279ef53ab5ef6f8522fb4454b8df4be0288af32493f2d940508d8a1bea07cbbd2022844e65a4e4448c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD51dba40fe5d290b753f12f35814cad170
SHA1e1cd1bc73a71075367dbaf318ee38dd85a4aaaa8
SHA256d9f3d3aeb8d1809ba870629dd062fbfc57efb29f73d6b281a45ceeef035badff
SHA512304e76f041f06e1d54d2fecc897872c06129027c0adeb8225915325a3b71964de0176102c66125837713b8c4c98375171528584b454a51e061585abf91c49467
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD545e67926d775732aa42bd10b30722750
SHA13aec3d3b4bf2eb643e1f6240ee57f40e8e52853f
SHA256fa233775090bcf49ae4ed6bd1742fdd605de27c00803661ec01552be6a746819
SHA5129523c4dda087c43b21e95a1a2ec912b0b5fe46a0c8cb663c8af3e1cc26fab433641347651568dacf06d2c4c69f9c6339dacf906f3b61eba1559ded55a487d1e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD530af74d77015c966ac2af376de4cb205
SHA1e35de926006d6ac78806ec709db3631eebba6678
SHA2560b9707f9c57d325660902f62afc24a7c3922882b4a98df7ed626d667ace88484
SHA512824866afd9f18c204c6d26f2384c61ebc8b77897928a8ad2881c9278e1e66ede95d525f3d473fe6b8d5a8ceb4839738e4d2edc1513ea1052bbceb8276434aed1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
253KB
MD5ba29e119f7741d7365b0292b2b51a2de
SHA1532aa563c1f8e3e9d00aaa7176fdfe1d60835b0b
SHA2562f8718a1c6e0b2488a7fd4d6e6cbb49921aa6fa7aa0fe4995a8a2e6269426959
SHA512c9b7cba0e4355ef2ab75494e29ee8c335a1cdfe0c3d0fb9eaa621a38128ebc80c7b4a7e80b8033a82b36d481bfccf9a8743ca33f02956d49977ed00f23ff3422
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5696ffba7b83ecf008523e96918f200d9
SHA1970d90e22c8b3674fc33cdd1913c51ef28514255
SHA256dc6dacd725d7385b2e4db1f488d93f2840d2289efdaaf3737849304d1ab9ba34
SHA512f8528683b70b58376f3eba3338fa6b462c9e9248c72524573005cff6397a0556bdcc2fdc2ebb020ba8218bc8174ba552002f223a245dfe3d3688826d24d63237
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD554caf18c2cda579e0dad6a9fc5179562
SHA1357d25de14903392900d034e37f5918b522e17c9
SHA25628d77529de92eb605d8afee0e133a7d08e13d4386e5e38d63e2da34623eaad6b
SHA51288da5a33df9d82408afb8344ec7dbaf7686435fdb55eccfb85d5560f39861e84cef5d71949d5efe7a191778e6be755a8448f3fc3d7043007037f9f5227e10210
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006Filesize
109KB
MD5f9870c3804d732dd94daae338af7c684
SHA1a6c0bf0367b8e00bbd976bbeb9e1dee37b57dac4
SHA25631b77b0ab31131b5ee5fd85144932b480b4139e6751495ef0d8437eef0586bb0
SHA5122dc023cbe9d66aadabb5fd98a07733996cb24e7bfb676946556c0893ddf21fe83d34b17d2b7f365427124bcbadf43004e73f570e0f39a8ac1e95bade4e61f8d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
816B
MD55b6251724866f2e341d8ff11c0f1e995
SHA18e1684cf3290cf9d0b8c8778c119579d3b0078e6
SHA2562c04ac54febfaebfb47bcf45492f609c06b3c66741f091f086d996893f2ebbe0
SHA5122ef6307945a98dc9ec8f8ac69c7d6f3acf0753c53b23f85833a817e9a3679792bf6fae348d9641a9f7fcf549b620077a16134415b733dddef1c37afb3dea94a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
612B
MD5714e40266c8280a5c523c4919caf8bc8
SHA16dbb182bc6658ec85c23f1838045772ffd082dac
SHA2563ab33cbe9b5a3065cf8255b259aa40830146509a97bbbb4bbdcd98780913a82e
SHA51226b065c26aa45f7cfdfeaecfb303b57a9c4119a4726b4def44556061320bac2bb819028b82ee59bb73ebf258b74923725f134d57a15c0da8bd7f53650a0822e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5cebb6b1a8bd8cbfc812acafeda738d89
SHA1c2f565a020ed2987777268fba20b28e79fe3b40d
SHA25673d2031592764f5262e50b380e2e7c8e07d957db9e380335441089a84583c203
SHA51283fe35f979cf10e4bce7a8eb5a074da35881b5d504b68b0598185ce6cd90adcc1e3ea74539f11e03be066f3c660c0536a10ffaaa1c1e8c6ffaa7fd9e50d4401d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD549f0c99da4451b3a5b41b843bf39bf27
SHA1123de2bbfd0cc040ff5032d2d517d8b72db15996
SHA2564a952d7c1bdf1cc82870cc1680f26186f7f7c567796272ec1d135974a99bec04
SHA512c92f56491f000752f0c868a13a6abed5c98f00504c192fc5e9a783e7669ee0f1d04b87aab2a2785f91e6a6f38c726fcbb260ecb65b4af819427fe9b9693c73b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5c26f1dacdc969fce65206fdb7bfdd9be
SHA1fbb4fa2ea7a3feb2d25b7cac828a9ec5cd5e6ab0
SHA25616013d908e033e0d4ffaa76b2fcb0d60e5d089fda2d299077b03409c73fc4293
SHA51243afd1b63109c755d78ce6a1a81e548cb89a292a9d8a3f9cdc6312e2ce2cd21e85d01e00c8599e5bf7f097827b27a4612349a568e621d3ea5efce104b9184755
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD53ebfafaed3de0915b55d53f19780ff46
SHA138d927409331c30c43fd8fe2ad0382fab9c2b07d
SHA25665e382341a917bea06288803649dd1ada112c5899493697273d1eb1db90e1e2c
SHA51200488a69cbc997d6fd7642fd87f8357f6850c3da12eb24c915150ebebff5106610885f7ad5f955f745e87d00a8a55e7ee99592ba7afed927b8d78b369e45ef41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
370B
MD5fef6280580deb4ecb1abe62b0de91504
SHA15dade044b7cf133193c8d401e194cc1c1a611384
SHA25683981e05d5e17dc8e1fc05e10996d9b90ce00819db2095623830a4755048c59e
SHA512380c6520bfea67181dae960f189897c13076862fb1a3981937f1d67161a8d3834006cf743966fbce321cbae4325147fbe37017b601121818f7210e7300898e98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5ab528.TMPFilesize
370B
MD5bcebf81de8ce3e7724f9a7706d6a1940
SHA1b8a19a6cbde10e0940d879664b88a0aa9bbc595d
SHA2566e39954bbb3b09913579145698341df722b895bc10c2c5a23e5c1d4b65e3fe50
SHA512255515c7b09af7ba6cd379fca665918e085d47f938266cac8e33ee12aebb73cab2db8402a79805bdbe99268d01e3a19b4c153f00ba2c9e4f006c76c8d03892dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5b71b0df62047abe8bd38575e52d87a01
SHA1e96637b46683d279b35279d424e8a4a66ba89ed2
SHA25662adb53a2b1e0fc85fbc8c69b8eede257883dc3bbd20fb45b0a2ba8ac613ede8
SHA51238132e76d128d32d6c6c1ac2943e202500642b43fe3cb247549838fd2fc687d845cec04a66958f984c23a271452e547d7b4e3873e74b38e37bf5b82a79798c2a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5781ca4b27268a55c87ed2617776c8b14
SHA1fd0ba44a20810419c626e7e991984ac419a16fe9
SHA25639c8d0a61726058905a3034e3df1da1180aa749c78619feeb407a49c41ff6150
SHA5126a590aca5f4334db505af7cedf8e11b5f9a10a47b0a9953d0881068458a377eebbf7c39bd4266111d2338145e455298d74dd830103c9bc4b2b6bb9ed805de5c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5544c6319a69341ed940cacbf1a17c14f
SHA1b2840506d5cabc68d29fdc997c24196aa1d94f0c
SHA2569da0db2a8a0e5f605ec73484ee541bb8b74e4f5d8284c14c222e38d48186c710
SHA512bbf76b99e810b4005010e33ec4288fb33149e51c0f7cb5d9fbbc6e81349bd45357c860d84559c7d567c6e718ff30abe0d3778f01aee791f03e6367cc2f83a056
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\activity-stream.discovery_stream.json.tmpFilesize
23KB
MD5832ac5a27f87f4d18c037071554774c7
SHA164ec6c4c7e718d345280ac3d72c2a4d6c98cb918
SHA2560d1bbf0ce14ee3881548cb3d16edc5c1449417c328d72dc0981bde8ca7107397
SHA51262278d8fd043d7116a54ce8e257a69c8bf98aeaa10dc70afa579363cc503783921d2460825a992eb9de7a5fd55d6ede8868d533787ef32718f6547b6e46f63bf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\doomed\1896Filesize
8KB
MD59c826a2834b83f487cb9de9e2e24e903
SHA133a7e06122e273351b46e231e7efa296c31ef321
SHA256628c0f9245698cb0cadccbe6ee45b007b6f2d3118324095f3f21856b46864e67
SHA512efa3a343889e82be0887ae7a581c67ae2f2fb6fce6a831a77eec1553df36118556202d16787c14a289128ae5cb62e29352d9810f1ddfb48f47ea5dbe2e043353
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\doomed\19337Filesize
8KB
MD5218202ad6cfb25b85af9b1dafb2eadf0
SHA1fbc8c567565d9b37e9a401524c57bdfec9adcf9c
SHA25664c846ec73045291287a0e3a2a6f2d3338220fae61e5d96ec2c986c3e881ae79
SHA5127129850f26f3c603f0a70547663e1d4059fc01d53c908cb8de1edb817d3159e12c676fcb8ea36a8700b544b297eb63e2f445a874b261fc2c4f512444e9de89ab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\doomed\5947Filesize
18KB
MD54939bbf251cf6f960ee061d538595a35
SHA1e05876ee3c1bc9e26b861f420f117243cd3a7814
SHA25611ba66dc3d1de5961c9ea8484576ae9700b33683b2970d348a36803e3ed9abe3
SHA512c71c77a1b71ec3ef1a2a4d083ff0ac1281e2c411b686cd606212a5cd5de2dca9196a83efe707ccaa4ffdc4b038822d8bc7c784a0425c6e9ef5d1e52ca0c30375
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\entries\2C4BAA6F19DAD1966BACFFE00E8A81C718359637Filesize
78KB
MD5e6630594f71c8d9b429972974f3ffe3d
SHA1c1c720f7363c021a1de9396a878eb605c04615f0
SHA256ad736f7bc88d7037caa00f3657f7b2fc335e8be78a644dffb4a5b70eb6b4a75c
SHA512c8f2f0e3929e84129880a6f1c5613a245340bf9fb48b2460021eb1134ae41091d9ddb5b70c6b4fc44869a5d13ab19c095197e312b1ec7d95a9b0a8cd04be5a38
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\entries\35355F15E378922B732C5987BE8814CDA5BE7788Filesize
432KB
MD541d8fd6e8b9830a4e2239ea7b44b0640
SHA17316dc6869c5375620ebc8e0b9e72c743dfcd19d
SHA2565f681601e7eb5f5059d682e5673e09e8a44f84dc2da723e09c7606cf7b8f6396
SHA51254264eaaf41ce66cfe0c094f4f5659bb1edd179920a74e9e218997b65ca748f0ca82a1a4ef143fbea365ae5cccc7934930b8d8532bfefe6042d590254027b8e3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\entries\3CAD2CD1EF7885339466EE1E33B4195A7CE143B0Filesize
1.7MB
MD57599c87cfb8c0b6d4f68d2356f1f877d
SHA145e353a4af45087942622d081227b391f1995481
SHA25621cc99b6f6be8b39cbf0d539740658cb4f0a8989b2661c1d15d86438655e5b9a
SHA512fe4a8226e5b17b6baa4025a4875e077f14dffe53ae9dee800bdeb029e102ddbbf8e4759001ad0215d17cd67b2db9f565de6e632a29f18f15c07a89edffaf35c9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\entries\48064F0EEEACBBFF08D018C9EA106739A90C1B01Filesize
97KB
MD53e1983b863ba5a62d90280a37059be3c
SHA1fe4dd3c2411b70c29c0c14502636368422a63601
SHA25615cb430090ddf786028ba98ca9a574d821a8b27ace0aa4aa2ebae4461738ce66
SHA5129c3e7b79e724dd2246cfc410d56eb1c933015594e7471c4f77c37083821e70fd3dcfab67ca2cf8e9c628c113efb0fae504a09d5504eae8a9760dfdb329a9908b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\cache2\entries\94E899915A61778489217B969A7F713B74CD0926Filesize
117KB
MD5215864377aae8895916367ef625070e0
SHA11ade94c0aeaccd8c01154e0b43fff193fb181ef7
SHA256cef3fe71aeb953d9ef0c098838b962c0eb66b0dde6358b68043646e2617e2da8
SHA5129c23600a95ccd15945a9d7749b5fcbf31d920e8b5356d335732c02bb7918c907dd74ba94b95a391782b3efc7d41f5c5d70e01a8ca93d2c0165922f6087fd4c89
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3wdd08zs.default-release\thumbnails\888d530a61a2bab35ceab709094cc4eb.pngFilesize
15KB
MD5f8904884a77d007458da7021ec72d58b
SHA1c6dfa522d69500a51b4d4e3e6e1550f987f0d332
SHA25650af3a5172f9bf211794d5758b636c7b60694962913ef8bc5f7b5a0a229ad249
SHA512b20b656e92a12342f096674a520e11365215d27246eb3957aff4d4ca06725b953453b5351f500655803ffa82a2b007c699a565f7912051f028a31d73e48a8f55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\prefs-1.jsFilesize
6KB
MD5098d782535071d0c08b87428347dddba
SHA1518fa510293229bc0d036ad05ebf36c181369793
SHA25687374676207445cce10f8ba241466dc01a7f64efd6e5e3582e443bc604aee3eb
SHA5121a57e8506aeab904eeaf4acc700bf9f24a2b1ea7bd18b1d88e714175b15c1e06b85382db8a5b85d07dce1193e589068cc0a2080ab14ab5925440e0482a598748
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\prefs-1.jsFilesize
7KB
MD58f1d498ba6f2cc78702d5da66d2d3917
SHA106fd8b2416f69e73e82d0d6844188f4dd141c32b
SHA256328652238457884609821303f1397433ef71aee256fe191df00cced641f62319
SHA51266363d8862cfd4aa464e28fd59b10a24475843bbbb1a0ff449b6a58557bddfcca47290809bc7453549b1580dbcab3d81b3e91116da7354abd522eace6bceb595
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\prefs-1.jsFilesize
6KB
MD514d50dca71c8e3cab3948e9e6b8b3829
SHA1a9a8ed42d08ca57b5c37e0739751ebf54719968b
SHA2564667c22fc6617d7d6c8cc77e8d3aa6ce731c0b050973c17ba22d6544bf1e0bf7
SHA51204aeed3e79499b6ef9db0f9522abd931abf4a7dffe272380062301e07336bd07cb89c22b6164a9a3b8174c085c87ef33f544a59cba75d86c4b53da1b05fbe728
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionCheckpoints.jsonFilesize
228B
MD566bdbb6de2094027600e5df8fbbf28f4
SHA1ce033f719ebce89ac8e5c6f0c9fed58c52eca985
SHA256df49028535e3efe4ed524570624866cca8152de6b0069ebb25580fce27dccebc
SHA51218782069ef647653df0b91cb13ba13174a09ce2a201e8f4adfb7b145baf6c3a9246ef74bdad0774a3023ec5b8b67aba320641e11dd4b8a195e1c2b448202a660
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
23KB
MD59285dfe3affdcbcb208d63f903ac7444
SHA17bed4195dfceb199b7d5cb70ca888b707ed87af1
SHA2560b7e7cca2bd0a6d25071404ea2a8cb69ab371cf53dd9496fc3a279a4e3df5e08
SHA51284c309ac66c6278ac3416f7dca1ba7343bc08257d3bf4c78a9b0ba9116ba7d816ccb8f153c2e78a3e85f197fd08f3e074bde7a8c3ecb8390660b69cb31bb9900
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
27KB
MD510ebc07f182bfb2f5c04728b69ce409c
SHA103033d38655eeca653526facc72ffbaf5da1dabf
SHA256acae0c8c38bd6efe1ad4aabbda4fc506470ce645c56eb51c90218816bdf1e6c8
SHA51222ebfec057701e03303bc171acb821295631f63c16b4e09851c3c4065fed938cb7890d09678990052faf280c97e5c3d9795a96eea6498286c38a0d096fcd3ec4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
42KB
MD58fcecfb3b444dc5a6297dc5b21a2925b
SHA1277e011474269dd21e5fc0f5837eb2fd6de3644f
SHA256c4fde62751db8c1fb4fd5d63b5c88af4ab08165a976b9c1cbde14fe4d30440e8
SHA51259ac71b6d41ad07dd0aa443b6e73e4ae9d54a87db72ccf66fca383d358b205a95518553ebeed4d858fdab1dc2dc8eb6b39f4de7f94d227a0b97065518ced3158
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD5fbcf0f30c46f21be94cd98c7e306a873
SHA1e839f0423d0c91b3445fe3cc78414dd271459ed8
SHA256b0061eccaf4c533f2acaca955527ed6edc3788e6b136c6f7a64044ceb65a589b
SHA512a30214518b13f582a6527f3421f4592d2029a756a9685d607672ea4edaab13f368537c37c8a9b2157d67b8fd41f1111df53b23d091a4f867100489c13748399b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
23KB
MD5647ae330bb74e7a0947b8a6ef30ab9c9
SHA15f07c0663967b1151b5226eb061971c4c8fecb85
SHA2565ad1245951055e35a6f5118c182044057b5f7f9bff06b308dc11a1104405ce85
SHA512c5d2db7ef28686f8154175ac2fd92062c4e78a5ab3ba350df89fea6d1a230dee854d6a2b4a76c8b20e3a8827d95de538417c1445fb6f256992ae62fd9dff10f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
28KB
MD5d617e2ae010569824137f8fc8c81b667
SHA127f85c6973b6c2f66bfe2360b096f2d22bfbb33f
SHA25622d3d2faa22539c11a4c139f88fd6e4575d39494ffa896a4dd0d782d3efd14a8
SHA512451291f27bed05bbb0ab266fb3ea7e270686d4ffda75b83da077c96dfa90ef553e24ec22e051f2ba7a301605fc86e3f8c403d469c8fd79c7c0c1658d4d4341f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
46KB
MD531488cea0dd2442fbea5895f88cda0a2
SHA1ea3b76fc4fae3add5a70d97daf8c398119b0fad9
SHA256714019010b41621c2993b745aee5825d72ef318009d84e0f1b9f3cc1c0ff5c1e
SHA5129aa3a8ecf2561f2086eae21470518695cffa1acb07432ed4dadc68282eb69e52a2e4f73a19e9b778af131107c013bd1efc581653b3df55a4d62a2ab12bf27a0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore-backups\recovery.jsonlz4Filesize
46KB
MD52d514f27f661e29f39c64368606a2661
SHA12ab84d5ab431ceaa8ccf182542abddffc46bf40f
SHA256ed16338d9e31862ed4597b4f8bd3fbb717a217f995ac054bb8e6b732097f93bf
SHA512989f08c8dd3a64329c98e7b3bb0e50a41d83e4470259e460d2958074dad33a53f14c44b08a596be78a0a9fe334fb797445de45c2b9564dd6f71963683647cc6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3wdd08zs.default-release\sessionstore.jsonlz4Filesize
46KB
MD5da2c610e577afc385b603f4c43b95861
SHA1848821afaafa0f476ae868e74d374174f3c22ae0
SHA2560f96ac77f374e8206dfbc38e1f5cfd5d8cd8a161f90f7421438ef5297616562a
SHA51290ceaaed0c3546a5b137874b116642852ceedeeca18a57f6e7e48c126ace953a26399980feef6b1fd5a86028dce2829f95b58d247d384802cb9d7e8d8bc31160
-
C:\Users\Admin\Downloads\Peki_Spoofer_V4.VeSXEvwZ.exe.partFilesize
29KB
MD54f0342de9fd85ed3029d0f87f4f6e455
SHA10cabdec36ac0d8a9b18de70015825841d72c5651
SHA25623efc34877926b54cc14e0dba9ed4f2295f04c9dcc811b46f0609a8a771f5473
SHA512012695a815134e8e6f01739aa5d4beca6a45e58cbc954c4c77b923664bcf2dd2000254ee3142377e3a668148f1a69e82955114393a8b0e858cdf81712dd6a3cd
-
C:\Users\Admin\Downloads\Peki_Spoofer_V4.exeFilesize
548KB
MD5c711b8ca38bb8185a6d6e41c38070538
SHA1465826e7cbc72487a4885e325a21d4ec66a1bdcf
SHA256ea1ac23002a691f0822ba54c6624f518251d946492ef1ef5c9286959d86b968b
SHA5127579d576be88908b70f23e1e33c99162090339a8b5a2dfec9212b82845b50bfa84dfaec431abd4ec0a169701c4cde93d3552851d53421eb2ab1517001b5338a0
-
C:\Windows\INF\Peki_Spoofer_V4.exeFilesize
34KB
MD5dc1095808c89bb35ff0103431b7ea109
SHA122e91a4db762bac13bbe3c537a25a50b8b07386e
SHA256087308045ec8e0fe44ae6e1d440ea5724e445073f21ed2987ed0ef1001564f1f
SHA5127a2f7d36e292cf42be00ef12c3c799a125762232044a864fe65a5e4676f2590d4fafe189eefb5944fab23d9ab975d9e66af0e1a843bc2c7047eb09b53cfbfe9d
-
C:\Windows\INF\dr43.exeFilesize
702KB
MD56ab27eb6a486f4794145309ad0d18e91
SHA1e414a7523480637747d3913662baa341aeb6abbf
SHA256131af227a519d4daf8233fb5139fd7ae75f594673b91eac9f0c108b0bbe87b1e
SHA512ac6966c6792e821ba927f1207c247596f19057900ae8108841fa00aa1af8afa724bc9417b3bd5643d1656cafaedce5f001f3652722e364f9b104bfcd44ed7457
-
C:\Windows\System32\perfc009.datFilesize
128KB
MD5834149a3fc2d6bae5e8bf3c78b843f01
SHA17d7cee90612195049d9fd8884c213e72b4371c8c
SHA2567accb384068aa6ec238267dd9a28bfbd434f39adaf45af5be8b2e3adc42d8b80
SHA5124bcbda0e2d8c2ebe82c44d3fac688787f9fcbf93845c74f2164ce831ca751f7e629e187497fec142b6ca3f76d379deb2a12746bb45297c3baca3f4855d9b827b
-
C:\Windows\System32\perfh009.datFilesize
686KB
MD52f07d393770f9c3176acaa802258cf3b
SHA189106ca40220547994916ac494e21967770755e8
SHA2567038b7d9499942ec4b5b667d1872552622d77681b88243c88a309293f9a78a8c
SHA5125fef602c782700b0e5e44fa1e4a14530062290d57dfa6e65ebe6e7523449ee16eab9fab367724fcc523277f468c756ae59c755b66393c9ea3d99e9e034d41307
-
C:\Windows\System32\wbem\Performance\WmiApRpl.hFilesize
435B
MD51cc4c3b9bb1657be77939f0b565e315d
SHA16a7ff123e96da6f7fb0fd9b7d7600bfc3540ee25
SHA2569eb3cbb0f65809845890159efdab0ff5a910da34252e7d5cff2929cc2fa6ab6a
SHA512fd461013902cf1f89485efc1cbdd07bc294253a1b60d9950e27cdb12937cbb39e3491ddb5dfdc4386df87fa44ee4ca9b3be01d7048850337ff9d68156eea78ef
-
C:\Windows\System32\wbem\Performance\WmiApRpl.iniFilesize
1KB
MD5a656a56b1fda4aa28383160ba6ebea3b
SHA1bda09bb6f5f28f5470147113e93d46a02853dfe1
SHA256639cf8acd1fe25a19b9841c9262b4227fcc33bb6658919d31b10ab849253b318
SHA512fbc74c738bbebb6265688ebec7a6bce18f5a59e98a5417701e5565d5c6e1f8c350da000005fc7441f8a4622043d4a8fd62efe54308cfa59f4ce9ed027dadebae
-
\??\pipe\crashpad_2988_GMTHYXKTWEKEHFEFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e