Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
Ojo Piojo.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Ojo Piojo.bat
Resource
win10v2004-20240709-en
Errors
General
-
Target
Ojo Piojo.bat
-
Size
1KB
-
MD5
205d95599348522f847430900fffe39e
-
SHA1
893b92af8d84b00469456145787cd05a633d355c
-
SHA256
b9c84926434a0738bfdb499702e63bda4aa56a3e487a63b60696177fe50bcef9
-
SHA512
9aa91e82ea69cb0bed1b01fc9a3852e884525d566bd8af6c7266f3c448739a333e93b5f01986ecff938f1de363e5ad862c5fd5ff201a8145b9e2f91e44393ce5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 4 IoCs
pid Process 5568 timeout.exe 3532 timeout.exe 3496 timeout.exe 2528 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "74" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 6084 msedge.exe 6084 msedge.exe 3924 identity_helper.exe 3924 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 6332 shutdown.exe Token: SeRemoteShutdownPrivilege 6332 shutdown.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6372 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4016 1524 cmd.exe 84 PID 1524 wrote to memory of 4016 1524 cmd.exe 84 PID 1524 wrote to memory of 2480 1524 cmd.exe 85 PID 1524 wrote to memory of 2480 1524 cmd.exe 85 PID 1524 wrote to memory of 5020 1524 cmd.exe 86 PID 1524 wrote to memory of 5020 1524 cmd.exe 86 PID 1524 wrote to memory of 1972 1524 cmd.exe 89 PID 1524 wrote to memory of 1972 1524 cmd.exe 89 PID 1524 wrote to memory of 3608 1524 cmd.exe 90 PID 1524 wrote to memory of 3608 1524 cmd.exe 90 PID 1524 wrote to memory of 4720 1524 cmd.exe 91 PID 1524 wrote to memory of 4720 1524 cmd.exe 91 PID 1524 wrote to memory of 3216 1524 cmd.exe 94 PID 1524 wrote to memory of 3216 1524 cmd.exe 94 PID 1524 wrote to memory of 2208 1524 cmd.exe 95 PID 1524 wrote to memory of 2208 1524 cmd.exe 95 PID 1524 wrote to memory of 3908 1524 cmd.exe 97 PID 1524 wrote to memory of 3908 1524 cmd.exe 97 PID 1524 wrote to memory of 4588 1524 cmd.exe 98 PID 1524 wrote to memory of 4588 1524 cmd.exe 98 PID 1524 wrote to memory of 2960 1524 cmd.exe 99 PID 1524 wrote to memory of 2960 1524 cmd.exe 99 PID 1524 wrote to memory of 264 1524 cmd.exe 102 PID 1524 wrote to memory of 264 1524 cmd.exe 102 PID 1524 wrote to memory of 3948 1524 cmd.exe 103 PID 1524 wrote to memory of 3948 1524 cmd.exe 103 PID 1524 wrote to memory of 1032 1524 cmd.exe 110 PID 1524 wrote to memory of 1032 1524 cmd.exe 110 PID 1524 wrote to memory of 3576 1524 cmd.exe 111 PID 1524 wrote to memory of 3576 1524 cmd.exe 111 PID 1524 wrote to memory of 3584 1524 cmd.exe 112 PID 1524 wrote to memory of 3584 1524 cmd.exe 112 PID 1524 wrote to memory of 3000 1524 cmd.exe 113 PID 1524 wrote to memory of 3000 1524 cmd.exe 113 PID 1524 wrote to memory of 2572 1524 cmd.exe 114 PID 1524 wrote to memory of 2572 1524 cmd.exe 114 PID 1524 wrote to memory of 2312 1524 cmd.exe 115 PID 1524 wrote to memory of 2312 1524 cmd.exe 115 PID 1524 wrote to memory of 2756 1524 cmd.exe 116 PID 1524 wrote to memory of 2756 1524 cmd.exe 116 PID 1524 wrote to memory of 384 1524 cmd.exe 117 PID 1524 wrote to memory of 384 1524 cmd.exe 117 PID 1524 wrote to memory of 1476 1524 cmd.exe 119 PID 1524 wrote to memory of 1476 1524 cmd.exe 119 PID 1524 wrote to memory of 4564 1524 cmd.exe 128 PID 1524 wrote to memory of 4564 1524 cmd.exe 128 PID 1524 wrote to memory of 3528 1524 cmd.exe 129 PID 1524 wrote to memory of 3528 1524 cmd.exe 129 PID 1524 wrote to memory of 1440 1524 cmd.exe 132 PID 1524 wrote to memory of 1440 1524 cmd.exe 132 PID 1524 wrote to memory of 1612 1524 cmd.exe 134 PID 1524 wrote to memory of 1612 1524 cmd.exe 134 PID 1524 wrote to memory of 3292 1524 cmd.exe 136 PID 1524 wrote to memory of 3292 1524 cmd.exe 136 PID 1524 wrote to memory of 1544 1524 cmd.exe 138 PID 1524 wrote to memory of 1544 1524 cmd.exe 138 PID 1524 wrote to memory of 2592 1524 cmd.exe 140 PID 1524 wrote to memory of 2592 1524 cmd.exe 140 PID 1524 wrote to memory of 4580 1524 cmd.exe 142 PID 1524 wrote to memory of 4580 1524 cmd.exe 142 PID 1524 wrote to memory of 4856 1524 cmd.exe 144 PID 1524 wrote to memory of 4856 1524 cmd.exe 144 PID 1524 wrote to memory of 2616 1524 cmd.exe 146 PID 1524 wrote to memory of 2616 1524 cmd.exe 146
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Ojo Piojo.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4016
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2480
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5020
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1972
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3608
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4720
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3216
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2208
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3908
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4588
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2960
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:264
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3948
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1032
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3576
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3584
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3000
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2572
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2312
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2756
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:384
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1476
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4564
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3528
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1440
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1612
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3292
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1544
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2592
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4580
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4856
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2616
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4872
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1344
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:876
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1416
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5024
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1980
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1804
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1668
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5028
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:960
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2840
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1644
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:632
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4288
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4244
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:472
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:3752
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4808
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:4340
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2380
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:2448
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:1136
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:828
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5072
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5140
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5204
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5240
-
-
C:\Windows\system32\cmd.execmd /c ""2⤵PID:5248
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\hack.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:23⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:83⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:83⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:13⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:13⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:13⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:13⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:13⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:13⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:13⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:13⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:13⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6708 /prefetch:13⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6992 /prefetch:13⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7196 /prefetch:13⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7432 /prefetch:13⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:13⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7596 /prefetch:13⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7808 /prefetch:13⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7964 /prefetch:13⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8100 /prefetch:13⤵PID:6148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:13⤵PID:6560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2270944119421249377,3928581553007610975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:13⤵PID:6568
-
-
-
C:\Windows\system32\timeout.exetimeout /t 4 /nobreak2⤵
- Delays execution with timeout.exe
PID:3532
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5024
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4872
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:1152
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3744
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5032
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:1916
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4324
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3020
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:2420
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5020
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5028
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4424
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:1336
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5228
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3824
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4060
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:1400
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4328
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:556
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:1148
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:2092
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3704
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5332
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5328
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:2952
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5476
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5532
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5492
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5488
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5436
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4816
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5440
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:828
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5168
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:2448
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5256
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5200
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5372
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5276
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:996
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4792
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3252
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3828
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3692
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5368
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5380
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5252
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5236
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:1748
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:3900
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5668
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5672
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5688
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5572
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5976
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5992
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:6008
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:6080
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:5000
-
-
C:\Windows\system32\msg.exemsg * Your system is in pain2⤵PID:4976
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:1452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:2504
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:1988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:4312
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:1032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:4008
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:3696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:4244
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:4424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:3044
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:5392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:5296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:1960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:2448
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:5140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:4080
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:2644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:1168
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aajtak.in/world/story/us-couple-finds-$10-million-in-gold-coins-while-walking-their-dog-204381-2014-02-262⤵PID:5060
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcd49946f8,0x7ffcd4994708,0x7ffcd49947183⤵PID:1416
-
-
-
C:\Windows\system32\timeout.exetimeout /t 2 /nobreak2⤵
- Delays execution with timeout.exe
PID:2528
-
-
C:\Windows\system32\shutdown.exeshutdown /r /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:6332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38ce055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:6372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
115KB
MD5d580275fe642f9d78da5e631aeb8c888
SHA1bc293fe371a6791c6b05fc428a112c0a7e033127
SHA256d9bc1c7987575ea79753ca38b5904b854cc7373e7ee858c85918fdbe68b5a518
SHA5126bf209b784bb7210477178b78e31f0744994beb3b47842daaa24d043445e0e664b2621daf71340b11322ba78fa5c901ee25625cec29016cb239864abc324c6a0
-
Filesize
104KB
MD5a855e99351199d73e3813e852fa0ab1a
SHA1e0bc50450cf8622030d2ac418b6046b397979150
SHA25636bcfd91209644e929b888fcadbe2e7b476cf2b451cf468f3e40b9a16676240a
SHA512b422e072b088fa20a052fe9e04c712030cd89df1b1838180e0017673d51b136f4a7650f9f216dac8b4301a5adcd50fe87f04441b189fe0ec6e891286d3b3361f
-
Filesize
120KB
MD5649f4ad3afa5a89fee42d9bbaa49a9db
SHA12cf1756111d6c0057049da462087f93ad8389658
SHA2563b1ec54517d8c1a6d455f2da1cd71a402ebd5a9abdf064b1604cee3bec345763
SHA5124bc3e79586eedbbbe9a082135c4d6d1516fb00f2c92785c1862b572e12e6c01c9b2b9bd77c4f9be405966de89a49e19b1ad9bd7eb4b5334001ff11f493c7eac2
-
Filesize
83KB
MD5e4b682ac32a568d0d1bad138e6cb831e
SHA104c5c88ac0d9d3cbf74664d617d77bdb5c68abdd
SHA2560fb5bf5e69220b7ae9afb9e2677286be1323e0609f61d8991f850e8c48db7c8e
SHA512023ddc78b5697d059708601134db7969b437854c358edfcef4c7fa0fad3e26f017c8fc384e1b82cfe5488ba2c2734cfe5675a4950023a41d8f891266c0db13a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.aajtak.in_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
6KB
MD5ca6b872d744af56a9d6914470ab49fd1
SHA107622914a27f2f505585eda14f48491f34f8d744
SHA256613af6563782b91e9ece2720074415f8060390783577b62243c78b2500f40ddb
SHA512dfea9f4faac904bd8f847c92392cf8da6618fc712d701eab12c04179601b39eb381d527cbf93240f53f48756255958442b4860d444362b6b2d9b24c49ec9f0f4
-
Filesize
9KB
MD55a9cb95b67f21c595ed34b5c7b464604
SHA1742b60fa5d5917057d4236dc6066cc9f1b01b64b
SHA256f05df0482e94e2aac7c684dd959ac7817fbaf77714800f8a0c907d4669988fe7
SHA5120130deaa0931d59ace5a1ca5c7dabe8bf7f0bb65d5e5fd7da5f9fed8d2070b2c0721f80d19f4e9adbcd86212b44ed59605a4b0e56e43114df281140ce1e840e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5403a940ebb90719a6acfbc4ee9823eb5
SHA1bca4e7f963146d98840b70558a29a92fd484fa00
SHA2564fd5b3b3709098e8965b27b22953c87006bdf854de9075bcc6ab3e12406dbdc7
SHA512c43800886215504be64236d12511f26261d366c592f7d8dfbddc84bab5496b762a36bfa9c1aea0f248a7653155f62f85d625432c71f26cf3e13c2d2d0cc5c6cd
-
Filesize
238B
MD5de708cbf9a4caa5e4c48f0cce5baf3a0
SHA1f0f4118748a35abb54806dab534275adbd4b6cfb
SHA256cd873a45c2361221549ae70c6e58504b7875e3350dba19b7642a57d60136a9db
SHA5121451d0e742830bf10036d0e9af1cf14ca16929171044d5f10e435081c3f33576a5a5fedc03a63714ac5bfcd1488e816d0c7251f31abc54acfefbea90e84c4306