Analysis
-
max time kernel
86s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 08:27
Behavioral task
behavioral1
Sample
2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe
Resource
win7-20240704-en
General
-
Target
2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe
-
Size
54.0MB
-
MD5
5d20d04ed7f6024bed1388022efd5eb7
-
SHA1
d4d1d3e03b3dd89a3a3b0a02433cd99cd7abe1d6
-
SHA256
218ec3e668160848093a7b64cb8325473821d466cf9d940e4bd5f4b981991936
-
SHA512
55b4ffdc9f236211e458a86907fa498047636c8d90c3c43219a0d43dd5d2c0464f44cd31559674b417315c439fffacd8b0b09981009726a2a6beb1bd79c31e40
-
SSDEEP
1572864:8LOrJXzVj0mz3uu2etPQiWmoh8rEf8CQn:8LqJXBj0kuu3IDmnrEAn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1856 powershell.exe 2772 powershell.exe -
Manipulates Digital Signatures 1 TTPs 2 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates\947D7D9A303915CF7CF7D2BED48EB84B5E3BB5E8\Blob = 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 IEXPLORE.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\947D7D9A303915CF7CF7D2BED48EB84B5E3BB5E8\Blob = 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 IEXPLORE.EXE -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\International\Geo\Nation avg.exe Key value queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\International\Geo\Nation ajC027.exe -
Executes dropped EXE 13 IoCs
pid Process 1644 anti.exe 776 PurchaseOrder.exe 1748 butdes.exe 1836 flydes.exe 1808 i.exe 536 butdes.tmp 2060 flydes.tmp 952 gx.exe 1672 bundle.exe 1848 avg.exe 1828 rckdck.exe 668 setup.exe 2908 ajC027.exe -
Loads dropped DLL 30 IoCs
pid Process 2692 cmd.exe 2692 cmd.exe 2692 cmd.exe 776 PurchaseOrder.exe 776 PurchaseOrder.exe 776 PurchaseOrder.exe 2692 cmd.exe 2692 cmd.exe 2692 cmd.exe 1836 flydes.exe 1748 butdes.exe 2692 cmd.exe 2692 cmd.exe 2692 cmd.exe 2692 cmd.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast avg.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\AVAST Software\Avast avg.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast ajC027.exe Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\SOFTWARE\AVAST Software\Avast ajC027.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 71 api.ipify.org 72 api.ipify.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ajC027.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 776 set thread context of 2636 776 PurchaseOrder.exe 464 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajC027.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flydes.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 2012 timeout.exe 2604 timeout.exe 308 timeout.exe -
Kills process with taskkill 64 IoCs
pid Process 3000 taskkill.exe 2180 taskkill.exe 1912 taskkill.exe 1560 taskkill.exe 1608 taskkill.exe 1520 taskkill.exe 2208 taskkill.exe 2336 Process not Found 2168 Process not Found 1456 taskkill.exe 2732 taskkill.exe 2856 Process not Found 2828 taskkill.exe 2168 taskkill.exe 2300 Process not Found 2180 Process not Found 776 taskkill.exe 1368 taskkill.exe 2328 taskkill.exe 1932 Process not Found 292 Process not Found 1368 Process not Found 3048 taskkill.exe 560 taskkill.exe 1844 taskkill.exe 2556 taskkill.exe 1576 taskkill.exe 1608 taskkill.exe 2164 Process not Found 3000 Process not Found 1560 Process not Found 2484 taskkill.exe 1456 taskkill.exe 2728 taskkill.exe 1932 taskkill.exe 2200 taskkill.exe 1896 Process not Found 2200 taskkill.exe 2564 taskkill.exe 1832 Process not Found 1268 taskkill.exe 2232 Process not Found 2708 Process not Found 2544 Process not Found 1980 Process not Found 2728 taskkill.exe 1796 Process not Found 2492 Process not Found 1608 taskkill.exe 2632 Process not Found 1476 Process not Found 2732 taskkill.exe 1964 taskkill.exe 2712 taskkill.exe 1696 taskkill.exe 812 Process not Found 1988 Process not Found 1164 Process not Found 1060 Process not Found 1756 taskkill.exe 1360 taskkill.exe 2564 taskkill.exe 2112 Process not Found 1528 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1F25B01-7405-11EF-9AD1-5A77BF4D32F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1F71DC1-7405-11EF-9AD1-5A77BF4D32F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 ajC027.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 ajC027.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2772 powershell.exe 1856 powershell.exe 2636 RegSvcs.exe 2636 RegSvcs.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 2908 ajC027.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 2908 ajC027.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe 1848 avg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 1236 taskkill.exe Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 1032 taskkill.exe Token: SeDebugPrivilege 448 taskkill.exe Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 1848 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 1668 taskkill.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 2296 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 292 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 1528 taskkill.exe Token: SeDebugPrivilege 1512 taskkill.exe Token: SeDebugPrivilege 2996 taskkill.exe Token: SeDebugPrivilege 1572 taskkill.exe Token: SeDebugPrivilege 2788 taskkill.exe Token: SeDebugPrivilege 2732 taskkill.exe Token: SeDebugPrivilege 2948 taskkill.exe Token: SeDebugPrivilege 2944 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 2748 taskkill.exe Token: SeDebugPrivilege 2620 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 2476 taskkill.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 2156 taskkill.exe Token: SeDebugPrivilege 1304 taskkill.exe Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 2484 taskkill.exe Token: SeDebugPrivilege 2304 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 2880 taskkill.exe Token: SeDebugPrivilege 2708 taskkill.exe Token: SeDebugPrivilege 812 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 1840 taskkill.exe Token: SeDebugPrivilege 1120 taskkill.exe Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 1564 taskkill.exe Token: SeDebugPrivilege 1892 taskkill.exe Token: SeDebugPrivilege 1896 taskkill.exe Token: SeDebugPrivilege 696 taskkill.exe Token: SeDebugPrivilege 932 taskkill.exe Token: SeDebugPrivilege 408 taskkill.exe Token: SeDebugPrivilege 2188 taskkill.exe Token: SeDebugPrivilege 1136 taskkill.exe Token: SeDebugPrivilege 992 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 560 taskkill.exe Token: SeDebugPrivilege 1692 taskkill.exe Token: SeDebugPrivilege 888 taskkill.exe Token: SeDebugPrivilege 948 taskkill.exe Token: SeDebugPrivilege 1940 taskkill.exe Token: SeDebugPrivilege 2336 taskkill.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1644 anti.exe 2688 iexplore.exe 2688 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe 2688 iexplore.exe 2688 iexplore.exe 2688 iexplore.exe 2688 iexplore.exe 2688 iexplore.exe 2688 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1644 anti.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 1752 iexplore.exe 1752 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1620 IEXPLORE.EXE 1848 avg.exe 2908 ajC027.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2692 2724 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 30 PID 2724 wrote to memory of 2692 2724 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 30 PID 2724 wrote to memory of 2692 2724 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 30 PID 2724 wrote to memory of 2692 2724 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 30 PID 2692 wrote to memory of 2596 2692 cmd.exe 32 PID 2692 wrote to memory of 2596 2692 cmd.exe 32 PID 2692 wrote to memory of 2596 2692 cmd.exe 32 PID 2692 wrote to memory of 2596 2692 cmd.exe 32 PID 2692 wrote to memory of 1644 2692 cmd.exe 34 PID 2692 wrote to memory of 1644 2692 cmd.exe 34 PID 2692 wrote to memory of 1644 2692 cmd.exe 34 PID 2692 wrote to memory of 1644 2692 cmd.exe 34 PID 2692 wrote to memory of 1820 2692 cmd.exe 36 PID 2692 wrote to memory of 1820 2692 cmd.exe 36 PID 2692 wrote to memory of 1820 2692 cmd.exe 36 PID 2692 wrote to memory of 1820 2692 cmd.exe 36 PID 2692 wrote to memory of 2044 2692 cmd.exe 37 PID 2692 wrote to memory of 2044 2692 cmd.exe 37 PID 2692 wrote to memory of 2044 2692 cmd.exe 37 PID 2692 wrote to memory of 2044 2692 cmd.exe 37 PID 2692 wrote to memory of 2012 2692 cmd.exe 39 PID 2692 wrote to memory of 2012 2692 cmd.exe 39 PID 2692 wrote to memory of 2012 2692 cmd.exe 39 PID 2692 wrote to memory of 2012 2692 cmd.exe 39 PID 1820 wrote to memory of 2556 1820 cmd.exe 40 PID 1820 wrote to memory of 2556 1820 cmd.exe 40 PID 1820 wrote to memory of 2556 1820 cmd.exe 40 PID 1820 wrote to memory of 2556 1820 cmd.exe 40 PID 1820 wrote to memory of 1236 1820 cmd.exe 43 PID 1820 wrote to memory of 1236 1820 cmd.exe 43 PID 1820 wrote to memory of 1236 1820 cmd.exe 43 PID 1820 wrote to memory of 1236 1820 cmd.exe 43 PID 1820 wrote to memory of 1788 1820 cmd.exe 44 PID 1820 wrote to memory of 1788 1820 cmd.exe 44 PID 1820 wrote to memory of 1788 1820 cmd.exe 44 PID 1820 wrote to memory of 1788 1820 cmd.exe 44 PID 1820 wrote to memory of 1032 1820 cmd.exe 45 PID 1820 wrote to memory of 1032 1820 cmd.exe 45 PID 1820 wrote to memory of 1032 1820 cmd.exe 45 PID 1820 wrote to memory of 1032 1820 cmd.exe 45 PID 1820 wrote to memory of 448 1820 cmd.exe 46 PID 1820 wrote to memory of 448 1820 cmd.exe 46 PID 1820 wrote to memory of 448 1820 cmd.exe 46 PID 1820 wrote to memory of 448 1820 cmd.exe 46 PID 1820 wrote to memory of 2180 1820 cmd.exe 47 PID 1820 wrote to memory of 2180 1820 cmd.exe 47 PID 1820 wrote to memory of 2180 1820 cmd.exe 47 PID 1820 wrote to memory of 2180 1820 cmd.exe 47 PID 1820 wrote to memory of 1560 1820 cmd.exe 48 PID 1820 wrote to memory of 1560 1820 cmd.exe 48 PID 1820 wrote to memory of 1560 1820 cmd.exe 48 PID 1820 wrote to memory of 1560 1820 cmd.exe 48 PID 1820 wrote to memory of 1908 1820 cmd.exe 49 PID 1820 wrote to memory of 1908 1820 cmd.exe 49 PID 1820 wrote to memory of 1908 1820 cmd.exe 49 PID 1820 wrote to memory of 1908 1820 cmd.exe 49 PID 1820 wrote to memory of 1684 1820 cmd.exe 50 PID 1820 wrote to memory of 1684 1820 cmd.exe 50 PID 1820 wrote to memory of 1684 1820 cmd.exe 50 PID 1820 wrote to memory of 1684 1820 cmd.exe 50 PID 1820 wrote to memory of 1848 1820 cmd.exe 51 PID 1820 wrote to memory of 1848 1820 cmd.exe 51 PID 1820 wrote to memory of 1848 1820 cmd.exe 51 PID 1820 wrote to memory of 1848 1820 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\!m.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\anti.exeanti.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K fence.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2940
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer3⤵PID:2044
-
-
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\PurchaseOrder.exePurchaseOrder.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\PurchaseOrder.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TESAYt.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TESAYt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp976F.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
-
C:\Windows\SysWOW64\cipher.execipher /k /h /e C:\Users\Admin\Desktop\*3⤵PID:1664
-
-
C:\Windows\SysWOW64\cipher.execipher C:\Users\Admin\Desktop\*3⤵PID:2344
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\doc.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:24⤵
- Manipulates Digital Signatures
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\infected.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\butdes.exebutdes.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\is-89Q2J.tmp\butdes.tmp"C:\Users\Admin\AppData\Local\Temp\is-89Q2J.tmp\butdes.tmp" /SL5="$30112,2719719,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\butdes.exe"4⤵
- Executes dropped EXE
PID:536
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\flydes.exeflydes.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\is-7DU2C.tmp\flydes.tmp"C:\Users\Admin\AppData\Local\Temp\is-7DU2C.tmp\flydes.tmp" /SL5="$20100,595662,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\flydes.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\i.exei.exe3⤵
- Executes dropped EXE
PID:1808
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:308
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\gx.exegx.exe3⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\7zS8B3B98A7\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS8B3B98A7\setup.exe --server-tracking-blob=MzY5Njg4ZTc1OTE1MjcyMTMxZmYwZTk4ODU3ZWE4Mjk0NjQ0Nzc5MjcxMWY4OGZhOThlNTU5YmNlNzA1NmJiOTp7ImNvdW50cnkiOiJOTCIsImVkaXRpb24iOiJzdGQtMiIsImh0dHBfcmVmZXJyZXIiOiJodHRwczovL3d3dy5vcGVyYS5jb20vIiwiaW5zdGFsbGVyX25hbWUiOiJPcGVyYUdYU2V0dXAuZXhlIiwicHJvZHVjdCI6Im9wZXJhX2d4IiwicXVlcnkiOiIvb3BlcmFfZ3gvc3RhYmxlL3dpbmRvd3M/ZWRpdGlvbj1zdGQtMiZ1dG1fc291cmNlPVBXTmdhbWVzJnV0bV9tZWRpdW09cGEmdXRtX2NhbXBhaWduPVBXTl9OTF9VVlJfMzczNiZlZGl0aW9uPXN0ZC0yJnV0bV9jb250ZW50PTM3MzZfJnV0bV9pZD0wNTgwYWM0YWUyOTA0ZDA3ODNkOTQxNWE0NWRhZGFkYSZodHRwX3JlZmVycmVyPWh0dHBzJTNBJTJGJTJGd3d3Lm9wZXJhLmNvbSUyRnJ1JTJGZ3glM0ZlZGl0aW9uJTNEc3RkLTIlMjZ1dG1fc291cmNlJTNEUFdOZ2FtZXMlMjZ1dG1fbWVkaXVtJTNEcGElMjZ1dG1fY2FtcGFpZ24lM0RQV05fTkxfVVZSXzM3MzYlMjZ1dG1fY29udGVudCUzRDM3MzZfJTI2dXRtX2lkJTNEMDU4MGFjNGFlMjkwNGQwNzgzZDk0MTVhNDVkYWRhZGEmdXRtX3NpdGU9b3BlcmFfY29tJnV0bV9sYXN0cGFnZT1vcGVyYS5jb20lMkZneCZ1dG1faWQ9MDU4MGFjNGFlMjkwNGQwNzgzZDk0MTVhNDVkYWRhZGEmZGxfdG9rZW49NzAwOTYzNzgiLCJ0aW1lc3RhbXAiOiIxNzI1ODAyMjIzLjgwMDQiLCJ1c2VyYWdlbnQiOiJNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBXaW42NDsgeDY0KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvMTI4LjAuMC4wIFNhZmFyaS81MzcuMzYgRWRnLzEyOC4wLjAuMCIsInV0bSI6eyJjYW1wYWlnbiI6IlBXTl9OTF9VVlJfMzczNiIsImNvbnRlbnQiOiIzNzM2XyIsImlkIjoiMDU4MGFjNGFlMjkwNGQwNzgzZDk0MTVhNDVkYWRhZGEiLCJsYXN0cGFnZSI6Im9wZXJhLmNvbS9neCIsIm1lZGl1bSI6InBhIiwic2l0ZSI6Im9wZXJhX2NvbSIsInNvdXJjZSI6IlBXTmdhbWVzIn0sInV1aWQiOiI0ODkyOGFmMC1jZDc3LTQ0NDctYTQyNy1kNzY5ODRmOGQ5NGMifQ==4⤵
- Executes dropped EXE
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\bundle.exebundle.exe3⤵
- Executes dropped EXE
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\rckdck.exerckdck.exe3⤵
- Executes dropped EXE
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\avg.exeavg.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\ajC027.exe"C:\Users\Admin\AppData\Local\Temp\ajC027.exe" /relaunch=8 /was_elevated=1 /tagdata4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD51f19189b0ac45f4f4af668778a977812
SHA17fedd7186051c85b0778bd8a033074cd30d36f14
SHA2568f3e2377982f3b242650c039c4be36fee1e2fe0f7c2d2c34caed22dac22dcba7
SHA5125cd6ffdb0fa1c608db823fd9e69bc3f5e17ba099627fdc66eb390fa3d59631b950128ca564c56ce9d4c51647f3ed7033090b14f1f4b98558d1400d8828b618fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5162af85f9b5a3bd0f50b2b64aa428567
SHA1702dd87be56c2669094c8a6fce77e26a4e806320
SHA256c15f67ed57b0c33f815ff0f880bbfbba2bf0c0ac8a7698826f8b03990651b4b0
SHA5123f14a01edc694a7e2a15740e61f8b035bab46c2ed1acfaf1391f92afcd4a0f9d1b6f020a658f18467f6b7083a0c022d12c4496fde9a9750cb5d7da6e6b262623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596aa447db9ae7b75c2efba9ca92449c2
SHA15f36265b5a01ffcd8639abb09428feee5a72b6a1
SHA25624f1947dcdc5a3a8b56d313faf2d1fe259a2edc1582b129977d8fb63f6d097c1
SHA5120de71e8f4816de300ea6414a955397560a3c2aa016175fbe3ab809f3cf17468e98e0de8b2a743ec178d13cf008e7359a0c6fe1c04178c9ba15d66572728ea564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608c1cb28580924dfef9afb0486fb3f1
SHA18115cf3a58f8997ac652a633275b507db4ed43f2
SHA256d4d9ca31ad8dc3c7b052c23f675415143236380e8bde2fb2f666e804ff96d1a4
SHA5123a159f02249497ae2d94b4be0a1a13529b3f9c39cb51c2d0ebe0d0dc704c2e372860d56edab84411a8cc3e99ca9ff4b862a8de122c0eabc24c2f8776a388aba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f9ba8bd5838176b56a2ab6140e95c9
SHA1fb2aefa6f05aa29daa9c78d77285ffdef7f23404
SHA256f3a0d896fd1c7fd1c6272e350c5b03b809db72cb99a346b33b6f3b908a7dc0ed
SHA51285b973344511cda6db164d075ad7bbd84efa64ed0c6c22fd5668108f553cb222426e66d37b078c82cd4c47382298f1cc6f9b90d49d5021bc057b3593f3622db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c339dbe5e1506e409e968a8874ee7922
SHA175a9e7c88c9d073b4e1309e7a61c6bd58f0d73e9
SHA25657a4195ddb81f1f3b3fcafd316b7d65426edc1dc6cedfe842d17d357095cb547
SHA51206eec70a7e2a2e5c4dc1a07285892bb5e57190a626f09d86f5ae58f6e2eff82898bf60665056ed3a6dcf19ff1839fd4c005cf881576ff4cf96f0ad29b859ddff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ebf1b6826008871915fa507be05651
SHA1e58106ab39bfabf233353553fc14c417e0939dda
SHA25689a5d95cd55cc1f540acedac8ae6baa913438a730f3f7453ae28f905f26c8d38
SHA5121b0f8fa06cc66bbf95f206731d6ba43bb1548a2325ef8e8c08f09df8e5dc44c40b49eb8a8e2422d76a3f3172bcef85887a1842ad298e08581d634cf13277589a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55213f072e44df63bb85d2ff9534c7b75
SHA104cc7e8cec8ca06e854a0456503f37a66d3a805a
SHA25681323661cd76d339560f50ca0934d09ec4d8c3899717a6f02bc731900d0b88a0
SHA5124debdf9f7b41977b3f4a61d3f254bfe91ca0d30d9a620ca34358421c6197f77a851a55b0ac89b28b02097313bb8ddec5306e65d925744f4e3f8fc413bccc413a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562200df0cebb97785a9a89196ece3674
SHA1d72a4d5a47f2b1f89d98e398d43e47d19e546462
SHA25650602a50f16c72bfc1677283ccf8a7d28f7b8285ca104aa5dcc849fe2945ee4b
SHA512c156b4003fd9b637f39dd3cdd04c47c1a3fa172c5f76d52aefaef6a91b01f2368bab41775f48bed73078ea76f5dba0e1de5fd0613f00e03c6a1203e6514e8dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1414254204878c3deb9563d849be41e
SHA10339b0cf8b405d6be14fc8443f823dea8cd69be3
SHA256c8101509a703616fb81e6028eb6b609caf749f87fc4f9ffbac74e1e81bfdba8d
SHA5122196d22bb7ff58a284b4788b2d227df818ee442c4be57d21dbd6194a21e8ec61361fc39947afe7bfd8ea18f9d9e6c3ed6d1bf997ad9b4a7930037c044bc75798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618afae6b3c1044b718a52f9df87a03f
SHA163d5f19b8cc39ec39afedad194ac328eafa2fa4c
SHA256a876b698e70181d060613f6c08394c74cfead26eebed1b0090a1d6560afe62c2
SHA5129c38c1e3e2bbca517e4173975fc095ab04d4a3c224d0d8ca9e6193b673241047bba7bc16325f363a69f56b2c12adb0b3ff5542cc89160759bfc3a77ae460f338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5753a6e66c2c98cf1059302a62d74079b
SHA1c6c2176db58038492d846bc2184aa56ee8563245
SHA25626eacb570217db1e353497fcd043d6bd718fa2cbd00c018a6a889f6fa1eb2854
SHA51225507bb55c493994014eb14eefbf19d468f4c40ac97ab0fced5ae50405d90fe044187207f8b6e7debf8835171c41fce93019d37ecf2452bb00377a6ef944a355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58768d2f96aed20ccb26d5bc6997ddb5a
SHA14bebcdc566f92563b5983b6207e19559ce0ccfd3
SHA256dfcb70247dd829be982158ec110aa9d6fc3ade36c7d37ca506fdd094fd5d8dd5
SHA512c68e8ca4ac149117ddca0b2c134ab7dd08ff82d8f04f16a07a55a4c3db6dac47f4c59da9446429d6c098f8557c922c89cb5dd8930dc7a66c14f67d325c97c457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f306ae1a2e008a2cff9d73f922aeca
SHA12730218043e9f43ddbc76b8f50eb24e243ef0ff0
SHA256cb01648b9593983b4aaa0ecd630fddc9a9e2e7905982dc812baad985edbab43e
SHA5127fe11769b5d13b279a71bcfeb243d791866e394e1e40c37b548fe2ff7d83784aa363179804dc749c629c9f2911dc88f15abd4e4d177e82a235d39762b8a72d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f125e3d04b34a76b4f79a1e456fd6f82
SHA10471cabdfbbd9638d22e2e556ba6d68af48099e9
SHA2567548321bfd0183ac80355a031ec79bd80b3b9427cd09f025e8dbeea3ca54edad
SHA512c5a994b62f5073cf135f62e08ee2273f88388cb7f01176092ca591da3c474a4f4b09475f3f5c9fccc42455161073de84baa7af5f3f5d3af49bc3c254fe445bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5ce325a5f9bcf6b2fcbef52e1f3068
SHA16c36e41124ab00e028bb8370e03b41d6fd4d5ac8
SHA2567a1c2a909cd6e4775fb11711e052c0fbe74f3b01b17df9fed7699aa09976db42
SHA5128062a3954fdf1e0fba686f15c227db098d756df3d9253a0c0aec7126e5c52873b502ea7ca9c5b3b83ddd822ee1e79690f5195457cdd2bf9afcc1b30cd6cf49c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb07418463e86d2835bdc201d7700ab
SHA1245a1cb36ccf891d2756f7a5872207bad04d2e55
SHA25600646302f9fe29096971aaa5c117225e745519e823fc32b9a2b18808842baed3
SHA512021674a1600891e8e64558bda93dd3a7769f82bd50bf7639bd1a16a9de17ab49a6ae52f4f60e522a5872a20ccda257036c0172e58f6302e0a30ac78cbbb09ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6010c2f2bfedecb597f53b9c9c4dd6c
SHA1ea212b91bb19e41f14ea73f78403937911febeba
SHA256f060ce41205fbde9a55d0bc549dde28fef08234e9e923e6a6d60c8ea72e29236
SHA5120607e1946421331bb461ae2a2e361cfdf77c49ea35d463ae7d5ff45d74c473d0877c021d7cf56d2deed7849f70d019031acfb659cc4b2cc6e30839711f6e0fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73f8a6cdbe2e26462cff3447e2f5ec5
SHA177ee4a4a1e2590f9ff4d1d85d7006082fd26c237
SHA256bebdd0dce6d98e01d91a876fdc2164f20eaa1c627e4f906ac08974c803761635
SHA5123fda32f826340a2ce9b4e1efd3182c222fcd8aca586dd2bd3add005103c31bc45b8820a35ff9249d0781228cc9e84b51fed5dc808a6d79385870eecb7128d2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519f67c4e33cd90efac29ad402e260edf
SHA192896b31ab8dd1755157bc532d3cbc48f4ec28ac
SHA256ed1e5ccef9d49fd4cdf336e3b9530a989fffd8fb6fe06be01de4a6590cca4dbd
SHA512adce4765bc26645d3ad08b33ab07d6ec5d7d87f2c9a41216b303a68aa9ed3b555c3f486eb44c4419b01bfb84f6a71d1af61fd8c99f41d3001c17ec30b5499c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5633ea205ea9cdf261d7f6f3bb527bef3
SHA176950d37ed64b02366f41c9ecbb240e549daa87d
SHA256bbf3b80a8d0b6e77b2840504afbae00d1a29974fd130835ceebc241ad499dd83
SHA512ded1fe98bd659fb38a7e1193a192bab74356294e8d9b3ea74a62c1b65e05b437b7b15f905b3aaff49f4f31a37fcb5ef8c842d5c28595b8ec459a803a6d36d404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9be4f5c019803796ca2f1fe54282d3
SHA16cc2820876f02cb7e3ff71743b677955b1fe1b26
SHA25661dfd279ce99cf41b53c2392a8b4c7605244ab2753333884f792ae781c4224d0
SHA512ba2b381d2cc60a4c2000d6e3e85153c9de9d732540aac7c526661590c26bae24aaa3b7680f7bfed21b10c631ea54250b0d55f5ac1865192c7ffac2d28772ca77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2f148ddeae0e89fc1673e4b8acca15
SHA1992cbb0035162ad9c0f1850a00baf0a5440218f7
SHA256145519c9e764e1af0ac02a480dcdd5d416638a4ec0012dfd7791730e7655aedf
SHA512d000665a1ade3f4308dc286024e211b89816bc298567b93c376f67e3ee51eb73cc6b895f2e83297fa90500d1b6781fe7188c2e1e736db4baca9f8d0e1020000d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509fb67fa1f77dc436769c69258a3a469
SHA16ae262212e2add8efc903de40c62dcf4faf6b7cb
SHA2560d14c6e1702e7ecde23c3163a2164fece3fbf11b08ba2bb8255e5d2fbf4cad08
SHA5121a8effda9820c2552d4f13088c15101a02ede461e3e09852c13a68fe501e2893e1b9f502fe7bec7fbd93bbf9d17a55e7b872dbeaeb7c8d688b79bbff4a33aee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc8dccf777cb82276c1a226e5d4d19c
SHA1631428e3bf4e3efd9ddbc0f342f6d4bcc66cd130
SHA256ac0f5fb3b7d6e5d9c508e0494da989bc927bfa27f5663e7004e5607c4041db0f
SHA512bf2934db0fb25da2974591e8c0d00c05bb1c1b9011e53efaaa955caad4b98e6264745e6f82afff5095048e64aa4137218e43a326809dd255e595769a9d7bcb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4c1934d5c7562117eae1760a3b43ed
SHA16bcb43e624ace754e8c33c9c856cc3ad80f48ee3
SHA256c48d4774192925f4d72633aa220aef265a07518a18c625a2db3da31f59fc9e09
SHA51291b5aee7261229776daa41da6ad6eccfbeb42bc617e6d13b76eec749a58e3e5b5225be874f6de69bc1f15e6c54bc496722626fb16abd5f99a57abe1b94dc988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c253db0101a6d725658d5148ec062b22
SHA16cc4c9fdc7f323558038003a29e93098f6cace38
SHA256a908b41b8f7b0c42fb51a07b1d531396e496ad985b29b3aab6f6da6afd90cdea
SHA5123a9eee6bcfb96a79e0f86d18a0ff64f47d6f1c64d0e9acd8108e38e16b224cef3af5420266cc1efc9cce7e79cb0ec95b4bc91014396b398137c34aaca9d26437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a1f30437ecb722f3a3003715a1d0d2
SHA1f183e09f1c87b5e719dc2051ac8cc56a8dffbcfa
SHA2566540dd47b976461270a05da32dc7825b50e1fb38ec0fa6e17ade5799cd402d1f
SHA512bb5b7d34440a362fec768d0d8476c94773e9438c30c252e17dd65a25db0196fcae1c479f4f10898bccddb242bbde55eace16468077a382b710965d966d42973e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f3016fcdc4c47ae5829ab2d9b320341c
SHA1a76926feadbde2ace4b3cf8d9b395113edf20719
SHA2562004bd2869a063e39ef4bcd53bd172e492b9bc1cb37e31ead2eb202633445d49
SHA512a1c7d07b4874a9713fa6424c0020acd32f63414f1b1b1ddf9924034edc3c44a1ed5e2b8bd80cf82c9289fcca5f5a0b4cc510a6032ba2e9a7cb0101d9711a5c11
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1F25B01-7405-11EF-9AD1-5A77BF4D32F0}.dat
Filesize4KB
MD5214fad47be7a8b690bf5955ca685113a
SHA1bf4e473fbd4655f52a1db9c49dd82c68932ea356
SHA25662c4c902fa26b3d7b50c7eacaa9f2f19bd5d0dea61c2c966f1f392beeb4a20dc
SHA512bf4b9666ec05bae844aac43648b808552c0197c4d83bb6f13d6a7650c6ba570950f62fa40ded48896d57d61302ce5515728838abb7324eaa6075a8d6c8847704
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A1F71DC1-7405-11EF-9AD1-5A77BF4D32F0}.dat
Filesize5KB
MD501c095d27b73377bfcc1d5d39ae3c2c7
SHA1c4397e2f997ceadbf99c890da28105740d4895be
SHA2568c18627e9e951354f4fd5d5d52be64e7918a95705b7d948d8ddd6df51e086a79
SHA512c5159ff533f34eddcf31b689a9a40560829939658b2dba7e3da3942df76e84fb8b13f1d39b3689fff282c286d0fbded9b4eae2510db55c6e5ae00f4ea8d493c2
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\!m.bat
Filesize1KB
MD561b00fa9f8f30bb8324ca1a5fd042c73
SHA144afb5a0f288d8baeb0f667ca7e978e48174e36c
SHA2567cf9aa4c080eac793113afce38a5c8081d19c51f68955ed06ebba73de7509b51
SHA5123db8cb8fe6f60b0424217cb50a409b5943e498313c6f8fbeb1074e945dfb92053313509235d5f13f98edbf0cf76bb9aefb0d810fcd51fbe9e4e52b9162135e2f
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\bundle.exe
Filesize429KB
MD5ae4581af98a5b38bce860f76223cb7c9
SHA16aa1e2cce517e5914a47816ef8ca79620e50e432
SHA2567c4b329a4018dc7e927a7d1078c846706efae6e6577f6809defaa51b636e7267
SHA51211ad90a030999bbb727dbfde7943d27f2442c247633cde5f9696e89796b0f750f85a9be96f01fa3fd1ec97653a334b1376d6bb76d9e43424cabe3a03893ecf04
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\butdes.exe
Filesize2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\code.js
Filesize4KB
MD5016bf2cf2bad527f1f1ea557408cb036
SHA123ab649b9fb99da8db407304ce9ca04f2b50c7b4
SHA25617bb814cfaa135628fd77aa8a017e4b0dcd3c266b8cdca99e4d7de5d215643c0
SHA512ac2d4f51b0b1da3c544f08b7d0618b50514509841f81bc9dad03329d5c1a90e205795a51ca59522d3aa660fb60faae19803eceeeea57f141217a6701a70510e7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\doc.html
Filesize15KB
MD55622e7755e5f6585a965396b0d528475
SHA1b059dc59658822334e39323b37082374e8eeaac4
SHA256080cb8ef0cbf5a5de9163b365eec8b29538e579f14a9caa45c0f11bc173c4147
SHA51262f5abda3473ca043bf126eed9d0bcc0f775b5ac5f85b4fe52d1d656f476f62188d22cf79b229059a5d05e9258980c787cb755f08ca86e24e5f48655b5447f8e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\download.jpg
Filesize8KB
MD501a5131931ef35acecbe557ba13f3954
SHA1c7afc7590d469432704d963ffcee31ad8bcfc175
SHA256d364872ddde28d81d23bb3b08f9e86f921b542f3a35fcaf12549cf5666462bd0
SHA512ce32352484d676bd0f47c24808707c603fe9f09e41afd63d90f07599f13a5e32c73b0970a9964632f76f5843dda87a033340ee12fadd87b9f219329d0c69b02e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\favicon.ico
Filesize5KB
MD5e0c7cc30d8f9a3cf0140bf838198571b
SHA12494a9ab234b90ff0a3cc2dbc152483fb540afd3
SHA25673bb7f4a70650054fb42f4c7ab85d9a683253a0df26703ecd4a2bb3155d93cb4
SHA5127b87a3296fd984d89dacfa70bdc274ed9faf553c3e086d3e865ed7a2e55f92fbb55bd270a5863ebb6b95f3ce26d321b5936665741300676863f40111b95a6e75
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\fence.bat
Filesize167B
MD56465a5431e01a80bf71aca9e9698e5b0
SHA1d56ed108f13a6c49d57f05e2bf698778fd0b98dc
SHA2561c5f05fecfc1f4fd508f1d3bbb93a47e8b8196b9eded5de7152a6fa57ca7580f
SHA512db7f64b8af595d0bf6fd142471868df6d29ec7cfbb49a7e0da63d9bc8ca8f319e4c41f2c7baeafe17a3679861163400ccb36c18617982b244aaf482e9c264e55
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\flydes.exe
Filesize833KB
MD5b401505e8008994bf2a14fdf0deac874
SHA1e4f7f375b1e88dd71a0274a997ed5d9491bde068
SHA2566bcf6b84d71737787e3cc8d9d0eed9720f388cc2d0337832a7e8ca3c6f455a41
SHA5121bca98547ecf5a98d42b1d77cff50ca79ee560c893b2470aeb86887fef6e40a5ccdb72956f04a1d2a862827eebd3b7746e3043f3e6209597dcde9385ed55cc11
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\fries.jpg
Filesize12KB
MD5c4d9d3cd21ef4de91abc95f99c4bc7dc
SHA1b2cf457237c44c824068727b8440fe6a352a360c
SHA2566fd1c3bde9a6a478e39d1cf2121e980c0bcf59454fe1673d707aa70170953bc9
SHA512d10fbb0bdfb30160484950aa58bd2f97c38cf2d0914550b4041c9acd273e8013920ef1ee74216f92437a44ab81111a4c70ed3dc2df680ee4d187c22557900ee7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\gx.exe
Filesize3.1MB
MD580bf3bf3b76c80235d24f7c698239089
SHA17f6071b502df985580e7c469c6d092472e355765
SHA2562b95e56af10406fbd3ecee38dab9e9c4a9b990d087f2ad2d7b1981c087829da2
SHA512076b8b6a80ea15738ce682cc715792546582d7a74f971f94f6b5b9cf8164f01280322baec7f72894ac4b8d63b9f2f6074e8fc5e47880ef6c0b57a47beef3581a
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\i.exe
Filesize12KB
MD5cea5426da515d43c88132a133f83ce68
SHA10c224d0bb777f1e3b186fdf58cc82860d96805cc
SHA2562be7a0865ded1c0bd1f92d5e09bb7b37a9e36a40487a687e0359c93878611a78
SHA5124c1f25147222c84dff513bebf00e828719454ad634ef9380cfc7835f0457a718b4b437ecb60c1fa72a7f83fbb67e1ddfcd225194eedda77034c72f8c752c642c
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\images.jpg
Filesize13KB
MD549f4fe0c8646909c7cf87adf68d896fd
SHA19193264c38e5ed9fa0f5be1d79f802cf946a74cf
SHA2569292dfcddc9e88e5dbc095ceeb83ce23400a3405a4d47fffc80656941c87d5ec
SHA5129df4db8c958110cea66f627170919346ed673d3c13aa55292484fc74ebac2864b0292cd4d66d35957b4b2740b2fe30ddfb9d9e04115d655fb58bf39e100d285e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\infected.html
Filesize972B
MD5f48be9db7436f1c53508f1ad70064459
SHA116b20d3933cc6398859f1334a848982cccfd8501
SHA256f79460fad80962fabe51f271a2ad33fd54c418fbb0a8646c1d78654696d7d7b2
SHA512c7870b4fd16827817fa16c68f9d1a51270cfd9dc052861977a12ffcbc91a1668c82f168f8b33661d68579cfed766e15d0e436794d0eed164946eb9927355b638
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\nuggets.webp
Filesize32KB
MD5e40209599b592630dcac551daeb6b849
SHA1851150b573f94f07e459c320d72505e52c3e74f0
SHA2563c9aefa00fb2073763e807a7eccac687dcc26598f68564e9f9cf9ffdcd90a2be
SHA5126da5895f2833a18ddb58ba4a9e78dd0b3047475cae248e974dc45d839f02c62772a6ba6dfe51dd9a37f29b7ec9780e799f60f0e476655006dec693164e17eec2
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\rckdck.exe
Filesize5.7MB
MD5e92ee999533998d0a7e7eeb7ee27cc1a
SHA1903257ae4f0b055170e631f8306d143d6af5ebac
SHA25660e28665e9a59738cd5ff1086238c9f08690c170b1927d478ed23acd10afa04d
SHA512ef0759f9b6bd3608cc64a59e6c4be73353dfa63e33f2cb8604a7e83f849f2686d399956a7b26d30bd1eb58003bf6c32d9be01435ac463b431d99d2d5f64782c6
-
Filesize
6.4MB
MD5defd30ea336650cc29c0c79fad6fa6b5
SHA1935d871ed86456c6dd3c83136dc2d1bda5988ff3
SHA256015a13bd912728e463df6807019b1914dffc3e6735830472e3287150a02e13f4
SHA5128c6ebbf398fb44ff2254db5a7a2ffbc8803120fa93fa6b72c356c6e8eca45935ab973fe3c90d52d5a7691365caf5b41fe2702b6c76a61a0726faccc392c40e54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
195KB
MD534939c7b38bffedbf9b9ed444d689bc9
SHA181d844048f7b11cafd7561b7242af56e92825697
SHA256b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0
SHA512bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
126KB
MD52597a829e06eb9616af49fcd8052b8bd
SHA1871801aba3a75f95b10701f31303de705cb0bc5a
SHA2567359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87
SHA5128e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35
-
Filesize
1KB
MD502049984509ef14877d13cd022ae6b64
SHA10ba946f9c85e7021d8f7c2f4790645a29b7f97ce
SHA2562e4e234d5b3737fa46f6deaac32ddef73b531041e83f1c0cf304b4510640b33c
SHA51299d42689b9740d8435db2ddf093c716594e6799930d66b73f236c983b3ea4cb31e446ec66ae76635b3675999aec1953ed788fa45939caf9abf3f96fe81368c86
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\947D7D9A303915CF7CF7D2BED48EB84B5E3BB5E8
Filesize1KB
MD55dd854bd47788eb6ce74457250b6206c
SHA10180eee5cc3cc49d86bbccc5bb09968534d54aca
SHA256c3a7de62c8a219c193a83d38a218580a52c4bb84867f983ad7757c0f3d1c8252
SHA512450972a6fe3373756ebcad714a2e3db77b83da2195b680e5070054f59534d18901416d2ca4455d248c750c401bd69f2e276da37ff4f518d36c010591d0f795d4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8G93NHSUW3KHG9DMCFIH.temp
Filesize7KB
MD5a7d15fcd584e8a90b612ae95756daea4
SHA18fda9ba7f3ab9eede26f4b58394514aa4bdbed56
SHA256dca2b9154c2a70bb86931bbccdb9d484037fe59e84d0e77b46e7fa2d3c50c560
SHA512ce218c424bee46b7a2b2cf9d0cbb0f9c9d375b21cbc892e1108ac01ad8b50f23258abe8c8b5656aed914f0f283c180c48887c045501dc4ca6872d8c932bb4a40
-
\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\PurchaseOrder.exe
Filesize934KB
MD5f7f32729079353000cd97b90aa314cc1
SHA121dbddeea2b634263c8fbf0d6178a9751d2467b8
SHA2568e29aa00863b1746ba25132f7ecb7bcb869d3a7e647dc8d6d3255491c5ac5212
SHA5122c40c12b81e7c377ddf0a6691ebeedc895dcf02c9211a1563b840de735fab77968565b1d3d0c40cc0b2b583fd4bfa1c69f995fca758ea85f548bf5797b5bf847
-
\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\anti.exe
Filesize1.9MB
MD5cb02c0438f3f4ddabce36f8a26b0b961
SHA148c4fcb17e93b74030415996c0ec5c57b830ea53
SHA25664677f7767d6e791341b2eac7b43df90d39d9bdf26d21358578d2d38037e2c32
SHA512373f91981832cd9a1ff0b8744b43c7574b72971b5b6b19ea1f4665b6c878f7a1c7834ac08b92e0eca299eb4b590bf10f48a0485350a77a5f85fc3d2dd6913db3
-
\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_222b20a7-6e60-442b-8093-c513f41f4acc\avg.exe
Filesize5.8MB
MD50dc93e1f58cbb736598ce7fa7ecefa33
SHA16e539aab5faf7d4ce044c2905a9c27d4393bae30
SHA2564ec941f22985fee21d2f9d2ae590d5dafebed9a4cf55272b688afe472d454d36
SHA51273617da787e51609ee779a12fb75fb9eac6ed6e99fd1f4c5c02ff18109747de91a791b1a389434edfe8b96e5b40340f986b8f7b88eac3a330b683dec565a7eff
-
Filesize
5.8MB
MD5c79bb78a0bad2559a7037913dd1f1f34
SHA1a5b36348ad93fdf971201f31136d8c9b056984a7
SHA256f63b47288af395ac9c02c980592691e2d446fe8b4d3813007433ae262af693c3
SHA5121bd81cbe784427e54903159225e0fd94c0fab1d9498c11db177d86268f34129e6835759a9a3e3822c717349043930e13168390fcc2f9a74f9699f14497cfc888
-
Filesize
2.1MB
MD5d21ae3f86fc69c1580175b7177484fa7
SHA12ed2c1f5c92ff6daa5ea785a44a6085a105ae822
SHA256a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450
SHA512eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f
-
Filesize
127KB
MD52027121c3cdeb1a1f8a5f539d1fe2e28
SHA1bcf79f49f8fc4c6049f33748ded21ec3471002c2
SHA2561dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1
SHA5125b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c
-
Filesize
36KB
MD5f840a9ddd319ee8c3da5190257abde5b
SHA13e868939239a5c6ef9acae10e1af721e4f99f24b
SHA256ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a
SHA5128e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a
-
Filesize
93KB
MD57b4bd3b8ad6e913952f8ed1ceef40cd4
SHA1b15c0b90247a5066bd06d094fa41a73f0f931cb8
SHA256a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754
SHA512d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2
-
Filesize
5.7MB
MD5f36f05628b515262db197b15c7065b40
SHA174a8005379f26dd0de952acab4e3fc5459cde243
SHA25667abd9e211b354fa222e7926c2876c4b3a7aca239c0af47c756ee1b6db6e6d31
SHA512280390b1cf1b6b1e75eaa157adaf89135963d366b48686d48921a654527f9c1505c195ca1fc16dc85b8f13b2994841ca7877a63af708883418a1d588afa3dbe8