Overview
overview
7Static
static
3da9aa96c96...18.exe
windows7-x64
7da9aa96c96...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ps.dll
windows7-x64
3$PLUGINSDI...ps.dll
windows10-2004-x64
31314.exe
windows7-x64
31314.exe
windows10-2004-x64
3$PROGRAM_F...rX.dll
windows7-x64
7$PROGRAM_F...rX.dll
windows10-2004-x64
7$PROGRAM_F...ce.exe
windows7-x64
3$PROGRAM_F...ce.exe
windows10-2004-x64
3gpupdate.exe
windows7-x64
3gpupdate.exe
windows10-2004-x64
3ipseccmd.exe
windows7-x64
3ipseccmd.exe
windows10-2004-x64
3polstore.dll
windows7-x64
3polstore.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3winipsec.dll
windows7-x64
3winipsec.dll
windows10-2004-x64
3ܾ�...��.bat
windows7-x64
3ܾ�...��.bat
windows10-2004-x64
3Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da9aa96c9630ec4e6d3afac19baac2f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
1314.exe
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
1314.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduBarX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduService.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PROGRAM_FILES/Baidu/Toolbar/BaiduBarX_Tmp/BaiduService.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
gpupdate.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
gpupdate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
ipseccmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
ipseccmd.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
polstore.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
polstore.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
winipsec.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
winipsec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
ܾ˿˲.bat
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
ܾ˿˲.bat
Resource
win10v2004-20240802-en
General
-
Target
ܾ˿˲.bat
-
Size
47KB
-
MD5
25aa3b4fe6817cad8ab174d6fbbf89c5
-
SHA1
2f991387bab6ae8bb8d6e329fe9f8e5ca037aaa9
-
SHA256
6ebfd09383073c4e4699fa90de19d47a0e2778ec6c363534af7840a85ea2939e
-
SHA512
35d19b1ec89019dccf097f2c7694c7b1f2326809a65895cda65446bfff13f9175a0b28ad3c74c73d0b2585b6b992097c587f3060b30cc63f9cb4e145df36a083
-
SSDEEP
768:+2Tbv2+ZWnrUeVRrSv1CP7V3+6acRGhujJ3TDkYTByayPEapZwB9D1X3YqSlNFSI:+2Tbv2+ZWnrUeVRrSv1CP7V3+6acRGhj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipseccmd.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1492 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3256 4520 cmd.exe 83 PID 4520 wrote to memory of 3256 4520 cmd.exe 83 PID 4520 wrote to memory of 3256 4520 cmd.exe 83 PID 4520 wrote to memory of 2264 4520 cmd.exe 86 PID 4520 wrote to memory of 2264 4520 cmd.exe 86 PID 4520 wrote to memory of 2264 4520 cmd.exe 86 PID 4520 wrote to memory of 2644 4520 cmd.exe 87 PID 4520 wrote to memory of 2644 4520 cmd.exe 87 PID 4520 wrote to memory of 2644 4520 cmd.exe 87 PID 4520 wrote to memory of 2860 4520 cmd.exe 88 PID 4520 wrote to memory of 2860 4520 cmd.exe 88 PID 4520 wrote to memory of 2860 4520 cmd.exe 88 PID 4520 wrote to memory of 4540 4520 cmd.exe 90 PID 4520 wrote to memory of 4540 4520 cmd.exe 90 PID 4520 wrote to memory of 4540 4520 cmd.exe 90 PID 4520 wrote to memory of 4624 4520 cmd.exe 91 PID 4520 wrote to memory of 4624 4520 cmd.exe 91 PID 4520 wrote to memory of 4624 4520 cmd.exe 91 PID 4520 wrote to memory of 1916 4520 cmd.exe 92 PID 4520 wrote to memory of 1916 4520 cmd.exe 92 PID 4520 wrote to memory of 1916 4520 cmd.exe 92 PID 4520 wrote to memory of 4424 4520 cmd.exe 93 PID 4520 wrote to memory of 4424 4520 cmd.exe 93 PID 4520 wrote to memory of 4424 4520 cmd.exe 93 PID 4520 wrote to memory of 2136 4520 cmd.exe 94 PID 4520 wrote to memory of 2136 4520 cmd.exe 94 PID 4520 wrote to memory of 2136 4520 cmd.exe 94 PID 4520 wrote to memory of 1908 4520 cmd.exe 95 PID 4520 wrote to memory of 1908 4520 cmd.exe 95 PID 4520 wrote to memory of 1908 4520 cmd.exe 95 PID 4520 wrote to memory of 2440 4520 cmd.exe 96 PID 4520 wrote to memory of 2440 4520 cmd.exe 96 PID 4520 wrote to memory of 2440 4520 cmd.exe 96 PID 4520 wrote to memory of 4272 4520 cmd.exe 98 PID 4520 wrote to memory of 4272 4520 cmd.exe 98 PID 4520 wrote to memory of 4272 4520 cmd.exe 98 PID 4520 wrote to memory of 3264 4520 cmd.exe 99 PID 4520 wrote to memory of 3264 4520 cmd.exe 99 PID 4520 wrote to memory of 3264 4520 cmd.exe 99 PID 4520 wrote to memory of 2296 4520 cmd.exe 100 PID 4520 wrote to memory of 2296 4520 cmd.exe 100 PID 4520 wrote to memory of 2296 4520 cmd.exe 100 PID 4520 wrote to memory of 404 4520 cmd.exe 101 PID 4520 wrote to memory of 404 4520 cmd.exe 101 PID 4520 wrote to memory of 404 4520 cmd.exe 101 PID 4520 wrote to memory of 5040 4520 cmd.exe 102 PID 4520 wrote to memory of 5040 4520 cmd.exe 102 PID 4520 wrote to memory of 5040 4520 cmd.exe 102 PID 4520 wrote to memory of 4792 4520 cmd.exe 103 PID 4520 wrote to memory of 4792 4520 cmd.exe 103 PID 4520 wrote to memory of 4792 4520 cmd.exe 103 PID 4520 wrote to memory of 2784 4520 cmd.exe 104 PID 4520 wrote to memory of 2784 4520 cmd.exe 104 PID 4520 wrote to memory of 2784 4520 cmd.exe 104 PID 4520 wrote to memory of 772 4520 cmd.exe 105 PID 4520 wrote to memory of 772 4520 cmd.exe 105 PID 4520 wrote to memory of 772 4520 cmd.exe 105 PID 4520 wrote to memory of 4984 4520 cmd.exe 106 PID 4520 wrote to memory of 4984 4520 cmd.exe 106 PID 4520 wrote to memory of 4984 4520 cmd.exe 106 PID 4520 wrote to memory of 972 4520 cmd.exe 107 PID 4520 wrote to memory of 972 4520 cmd.exe 107 PID 4520 wrote to memory of 972 4520 cmd.exe 107 PID 4520 wrote to memory of 3480 4520 cmd.exe 108
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ܾ˿˲.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\gpupdate.exegpupdate2⤵
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -o -x2⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -x2⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/135" -f *+0:135:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/135" -f *+0:135:UDP -n BLOCK -x2⤵PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/445" -f *+0:445:TCP -n BLOCK -x2⤵PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/445" -f *+0:445:UDP -n BLOCK -x2⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1025" -f *+0:1025:TCP -n BLOCK -x2⤵PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/139" -f *+0:139:UDP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1068" -f *+0:1068:TCP -n BLOCK -x2⤵PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5554" -f *+0:5554:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9995" -f *+0:9995:TCP -n BLOCK -x2⤵PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9996" -f *+0:9996:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6129" -f *+0:6129:TCP -n BLOCK -x2⤵PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block ICMP/255" -f *+0:255:ICMP -n BLOCK -x2⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/43958" -f *+0:43958:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20034" -f *+0:20034:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1092" -f *+0:1092:TCP -n BLOCK -x2⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/3996" -f *+0:3996:TCP -n BLOCK -x2⤵PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4060" -f *+0:4060:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4590" -f *+0:4590:TCP -n BLOCK -x2⤵PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1080" -f *+0:1080:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/113" -f *+0:113:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/79" -f *+0:79:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block UDP/53" -f *+0:53:UDP -n BLOCK -x2⤵PID:180
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/53" -f *+0:53:TCP -n BLOCK -x2⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/707" -f *+0:707:TCP -n BLOCK -x2⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/808" -f *+0:808:TCP -n BLOCK -x2⤵PID:4608
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23" -f *+0:23:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/520" -f *+0:520:TCP -n BLOCK -x2⤵PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1999" -f *+0:1999:TCP -n BLOCK -x2⤵PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2001" -f *+0:2001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2023" -f *+0:2023:TCP -n BLOCK -x2⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2583" -f *+0:2583:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/3389" -f *+0:3389:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4444" -f *+0:4444:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4899" -f *+0:4899:TCP -n BLOCK -x2⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5800" -f *+0:5800:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5900" -f *+0:5900:TCP -n BLOCK -x2⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8888" -f *+0:8888:TCP -n BLOCK -x2⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6129" -f *+0:6129:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6267" -f *+0:6267:TCP -n BLOCK -x2⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/660" -f *+0:660:TCP -n BLOCK -x2⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6671" -f *+0:6671:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6939" -f *+0:6939:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7511" -f *+0:7511:TCP -n BLOCK -x2⤵PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7626" -f *+0:7626:TCP -n BLOCK -x2⤵PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8011" -f *+0:8011:TCP -n BLOCK -x2⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9989" -f *+0:9989:TCP -n BLOCK -x2⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/19191" -f *+0:19191:TCP -n BLOCK -x2⤵PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1029" -f *+0:1029:TCP -n BLOCK -x2⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20168" -f *+0:20168:TCP -n BLOCK -x2⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23444" -f *+0:23444:TCP -n BLOCK -x2⤵PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/27374" -f *+0:27374:TCP -n BLOCK -x2⤵PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30100" -f *+0:30100:TCP -n BLOCK -x2⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31337" -f *+0:31337:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/45576" -f *+0:45576:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50766" -f *+0:50766:TCP -n BLOCK -x2⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/61466" -f *+0:61466:TCP -n BLOCK -x2⤵PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31338" -f *+0:31338:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8102" -f *+0:8102:TCP -n BLOCK -x2⤵PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2000" -f *+0:2000:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31339" -f *+0:31339:TCP -n BLOCK -x2⤵PID:4000
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2001" -f *+0:2001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/31666" -f *+0:31666:TCP -n BLOCK -x2⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/34324" -f *+0:34324:TCP -n BLOCK -x2⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40412" -f *+0:40412:TCP -n BLOCK -x2⤵PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40421" -f *+0:40421:TCP -n BLOCK -x2⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/8011" -f *+0:8011:TCP -n BLOCK -x2⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40422" -f *+0:40422:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23444" -f *+0:23444:TCP -n BLOCK -x2⤵PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40423" -f *+0:40423:TCP -n BLOCK -x2⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23445" -f *+0:23445:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/40426" -f *+0:40426:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50505" -f *+0:50505:TCP -n BLOCK -x2⤵PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/27374" -f *+0:27374:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50766" -f *+0:50766:TCP -n BLOCK -x2⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/53001" -f *+0:53001:TCP -n BLOCK -x2⤵PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/61466" -f *+0:61466:TCP -n BLOCK -x2⤵PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/121" -f *+0:121:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/666" -f *+0:666:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/65000" -f *+0:65000:TCP -n BLOCK -x2⤵PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1001" -f *+0:1001:TCP -n BLOCK -x2⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6400" -f *+0:6400:TCP -n BLOCK -x2⤵PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1600" -f *+0:1600:TCP -n BLOCK -x2⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/12346" -f *+0:12346:TCP -n BLOCK -x2⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1807" -f *+0:1807:TCP -n BLOCK -x2⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20034" -f *+0:20034:TCP -n BLOCK -x2⤵PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1981" -f *+0:1981:TCP -n BLOCK -x2⤵PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1243" -f *+0:1243:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1001" -f *+0:1001:TCP -n BLOCK -x2⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30100" -f *+0:30100:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1011" -f *+0:1011:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1001" -f *+0:1001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1170" -f *+0:1170:TCP -n BLOCK -x2⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/20000" -f *+0:20000:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1234" -f *+0:1234:TCP -n BLOCK -x2⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/65000" -f *+0:65000:TCP -n BLOCK -x2⤵PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1245" -f *+0:1245:TCP -n BLOCK -x2⤵PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1492" -f *+0:1492:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1170" -f *+0:1170:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1999" -f *+0:1999:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30303" -f *+0:30303:TCP -n BLOCK -x2⤵PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2001" -f *+0:2001:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6969" -f *+0:6969:TCP -n BLOCK -x2⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2023" -f *+0:2023:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/61466" -f *+0:61466:TCP -n BLOCK -x2⤵PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2115" -f *+0:2115:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/12076" -f *+0:12076:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2140" -f *+0:2140:TCP -n BLOCK -x2⤵PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4950" -f *+0:4950:TCP -n BLOCK -x2⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2140" -f *+0:2140:TCP -n BLOCK -x2⤵PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/16969" -f *+0:16969:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2801" -f *+0:2801:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1245" -f *+0:1245:TCP -n BLOCK -x2⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30129" -f *+0:30129:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5742" -f *+0:5742:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/3700" -f *+0:3700:TCP -n BLOCK -x2⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2583" -f *+0:2583:TCP -n BLOCK -x2⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4092" -f *+0:4092:TCP -n BLOCK -x2⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1033" -f *+0:1033:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4590" -f *+0:4590:TCP -n BLOCK -x2⤵PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/1981" -f *+0:1981:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5000" -f *+0:5000:TCP -n BLOCK -x2⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/555" -f *+0:555:TCP -n BLOCK -x2⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5001" -f *+0:5001:TCP -n BLOCK -x2⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/2023" -f *+0:2023:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5321" -f *+0:5321:TCP -n BLOCK -x2⤵PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/666" -f *+0:666:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5400" -f *+0:5400:TCP -n BLOCK -x2⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/21554" -f *+0:21554:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5401" -f *+0:5401:TCP -n BLOCK -x2⤵PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/50766" -f *+0:50766:TCP -n BLOCK -x2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5402" -f *+0:5402:TCP -n BLOCK -x2⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/34324" -f *+0:34324:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5569" -f *+0:5569:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/30999" -f *+0:30999:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6670" -f *+0:6670:TCP -n BLOCK -x2⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/11000" -f *+0:11000:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6771" -f *+0:6771:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/23456" -f *+0:23456:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6969" -f *+0:6969:TCP -n BLOCK -x2⤵PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/555" -f *+0:555:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/6969" -f *+0:6969:TCP -n BLOCK -x2⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5400" -f *+0:5400:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7000" -f *+0:7000:TCP -n BLOCK -x2⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/4950" -f *+0:4950:TCP -n BLOCK -x2⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7300" -f *+0:7300:TCP -n BLOCK -x2⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9989" -f *+0:9989:TCP -n BLOCK -x2⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7301" -f *+0:7301:TCP -n BLOCK -x2⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9872" -f *+0:9872:TCP -n BLOCK -x2⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7306" -f *+0:7306:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/11223" -f *+0:11223:TCP -n BLOCK -x2⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7307" -f *+0:7307:TCP -n BLOCK -x2⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/22222" -f *+0:22222:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7308" -f *+0:7308:TCP -n BLOCK -x2⤵PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/53001" -f *+0:53001:TCP -n BLOCK -x2⤵PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/7789" -f *+0:7789:TCP -n BLOCK -x2⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/5569" -f *+0:5569:TCP -n BLOCK -x2⤵
- System Location Discovery: System Language Discovery
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/9872" -f *+0:9872:TCP -n BLOCK -x2⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\ipseccmd.exeipseccmd -w REG -p "HFUT_SECU" -x2⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\gpupdate.exegpupdate2⤵PID:2932
-
-
C:\Windows\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\ipfilter.reg2⤵
- Runs .reg file with regedit
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD52ec848b74381cf126093f24c07d38a12
SHA1714b70211dabef834fb9663ca9f25acb09b3370c
SHA256eea0d7b49bd2d82a47817ca7ddd4934d8d818f7cea06ba2833978b1ab58b835b
SHA51250a7d62330ff5edf43dbee44456311afb83dcf974e08c50f04a958f709936330b1f89f626ef03906542cc7d9acc3dc2d33fda84166cc30a3b3478b96b2803a2c