Analysis
-
max time kernel
71s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 08:27
Behavioral task
behavioral1
Sample
2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe
Resource
win7-20240704-en
General
-
Target
2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe
-
Size
54.0MB
-
MD5
5d20d04ed7f6024bed1388022efd5eb7
-
SHA1
d4d1d3e03b3dd89a3a3b0a02433cd99cd7abe1d6
-
SHA256
218ec3e668160848093a7b64cb8325473821d466cf9d940e4bd5f4b981991936
-
SHA512
55b4ffdc9f236211e458a86907fa498047636c8d90c3c43219a0d43dd5d2c0464f44cd31559674b417315c439fffacd8b0b09981009726a2a6beb1bd79c31e40
-
SSDEEP
1572864:8LOrJXzVj0mz3uu2etPQiWmoh8rEf8CQn:8LqJXBj0kuu3IDmnrEAn
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5144 powershell.exe 5664 powershell.exe -
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\E4E243954C0F0D5AB78BB7FCFEBEA25443D32937\Blob = 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 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation PurchaseOrder.exe -
Executes dropped EXE 7 IoCs
pid Process 2228 anti.exe 3928 PurchaseOrder.exe 5916 butdes.exe 4404 flydes.exe 5816 i.exe 4500 flydes.tmp 828 butdes.tmp -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 220 api.ipify.org 219 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3928 set thread context of 4292 3928 PurchaseOrder.exe 457 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PurchaseOrder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1144 timeout.exe 700 timeout.exe 5760 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 64 IoCs
pid Process 2856 Process not Found 5936 Process not Found 2244 taskkill.exe 5696 taskkill.exe 2384 taskkill.exe 2528 taskkill.exe 728 Process not Found 5604 Process not Found 3596 Process not Found 5780 taskkill.exe 5280 taskkill.exe 1788 taskkill.exe 5428 Process not Found 6052 taskkill.exe 1192 taskkill.exe 3124 Process not Found 5460 Process not Found 2284 taskkill.exe 2200 taskkill.exe 1416 Process not Found 4968 taskkill.exe 6116 Process not Found 2712 Process not Found 6056 taskkill.exe 6040 taskkill.exe 4384 taskkill.exe 5496 taskkill.exe 5764 taskkill.exe 1144 Process not Found 4076 Process not Found 2132 Process not Found 1140 taskkill.exe 3144 taskkill.exe 5480 taskkill.exe 700 Process not Found 5888 Process not Found 2868 taskkill.exe 1416 Process not Found 2332 Process not Found 2720 taskkill.exe 5852 taskkill.exe 5428 taskkill.exe 3156 Process not Found 3868 Process not Found 3948 taskkill.exe 5716 taskkill.exe 6100 taskkill.exe 3700 taskkill.exe 1028 taskkill.exe 1704 taskkill.exe 6096 taskkill.exe 1392 taskkill.exe 3740 taskkill.exe 2248 taskkill.exe 5896 Process not Found 5304 Process not Found 180 Process not Found 1820 taskkill.exe 1860 taskkill.exe 3476 taskkill.exe 5556 taskkill.exe 3392 Process not Found 2832 Process not Found 4044 Process not Found -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 2044 msedge.exe 2044 msedge.exe 4148 msedge.exe 4148 msedge.exe 5436 identity_helper.exe 5436 identity_helper.exe 5144 powershell.exe 5144 powershell.exe 4292 RegSvcs.exe 4292 RegSvcs.exe 4292 RegSvcs.exe 5664 powershell.exe 5664 powershell.exe 5144 powershell.exe 5664 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1084 taskkill.exe Token: SeDebugPrivilege 4676 taskkill.exe Token: SeDebugPrivilege 3152 taskkill.exe Token: SeDebugPrivilege 3172 taskkill.exe Token: SeDebugPrivilege 1308 taskkill.exe Token: SeDebugPrivilege 2368 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 4044 taskkill.exe Token: SeDebugPrivilege 3444 taskkill.exe Token: SeDebugPrivilege 2384 taskkill.exe Token: SeDebugPrivilege 636 taskkill.exe Token: SeDebugPrivilege 4220 taskkill.exe Token: SeDebugPrivilege 1804 taskkill.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 4376 taskkill.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeDebugPrivilege 2216 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 4760 taskkill.exe Token: SeDebugPrivilege 4680 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 4984 taskkill.exe Token: SeDebugPrivilege 712 taskkill.exe Token: SeDebugPrivilege 3532 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2092 taskkill.exe Token: SeDebugPrivilege 3596 taskkill.exe Token: SeDebugPrivilege 3604 taskkill.exe Token: SeDebugPrivilege 3808 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 876 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 4696 taskkill.exe Token: SeDebugPrivilege 2052 taskkill.exe Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 4148 taskkill.exe Token: SeDebugPrivilege 3060 taskkill.exe Token: SeDebugPrivilege 1768 taskkill.exe Token: SeDebugPrivilege 2184 taskkill.exe Token: SeDebugPrivilege 3612 taskkill.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 3724 taskkill.exe Token: SeDebugPrivilege 3120 taskkill.exe Token: SeDebugPrivilege 3600 taskkill.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 3800 taskkill.exe Token: SeDebugPrivilege 3988 taskkill.exe Token: SeDebugPrivilege 3564 taskkill.exe Token: SeDebugPrivilege 4688 taskkill.exe Token: SeDebugPrivilege 4912 taskkill.exe Token: SeDebugPrivilege 1392 taskkill.exe Token: SeDebugPrivilege 3880 taskkill.exe Token: SeDebugPrivilege 2340 taskkill.exe Token: SeDebugPrivilege 2112 taskkill.exe Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 1268 taskkill.exe Token: SeDebugPrivilege 3896 taskkill.exe Token: SeDebugPrivilege 3760 taskkill.exe Token: SeDebugPrivilege 2656 taskkill.exe Token: SeDebugPrivilege 3480 taskkill.exe Token: SeDebugPrivilege 4392 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2228 anti.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2228 anti.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4428 4260 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 82 PID 4260 wrote to memory of 4428 4260 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 82 PID 4260 wrote to memory of 4428 4260 2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe 82 PID 4428 wrote to memory of 2636 4428 cmd.exe 84 PID 4428 wrote to memory of 2636 4428 cmd.exe 84 PID 4428 wrote to memory of 2636 4428 cmd.exe 84 PID 4428 wrote to memory of 2228 4428 cmd.exe 91 PID 4428 wrote to memory of 2228 4428 cmd.exe 91 PID 4428 wrote to memory of 2228 4428 cmd.exe 91 PID 4428 wrote to memory of 100 4428 cmd.exe 94 PID 4428 wrote to memory of 100 4428 cmd.exe 94 PID 4428 wrote to memory of 100 4428 cmd.exe 94 PID 4428 wrote to memory of 4724 4428 cmd.exe 96 PID 4428 wrote to memory of 4724 4428 cmd.exe 96 PID 4428 wrote to memory of 4724 4428 cmd.exe 96 PID 4428 wrote to memory of 1144 4428 cmd.exe 97 PID 4428 wrote to memory of 1144 4428 cmd.exe 97 PID 4428 wrote to memory of 1144 4428 cmd.exe 97 PID 100 wrote to memory of 1084 100 cmd.exe 98 PID 100 wrote to memory of 1084 100 cmd.exe 98 PID 100 wrote to memory of 1084 100 cmd.exe 98 PID 100 wrote to memory of 4676 100 cmd.exe 99 PID 100 wrote to memory of 4676 100 cmd.exe 99 PID 100 wrote to memory of 4676 100 cmd.exe 99 PID 100 wrote to memory of 3152 100 cmd.exe 100 PID 100 wrote to memory of 3152 100 cmd.exe 100 PID 100 wrote to memory of 3152 100 cmd.exe 100 PID 100 wrote to memory of 3172 100 cmd.exe 101 PID 100 wrote to memory of 3172 100 cmd.exe 101 PID 100 wrote to memory of 3172 100 cmd.exe 101 PID 100 wrote to memory of 1308 100 cmd.exe 102 PID 100 wrote to memory of 1308 100 cmd.exe 102 PID 100 wrote to memory of 1308 100 cmd.exe 102 PID 100 wrote to memory of 2368 100 cmd.exe 103 PID 100 wrote to memory of 2368 100 cmd.exe 103 PID 100 wrote to memory of 2368 100 cmd.exe 103 PID 100 wrote to memory of 1720 100 cmd.exe 104 PID 100 wrote to memory of 1720 100 cmd.exe 104 PID 100 wrote to memory of 1720 100 cmd.exe 104 PID 100 wrote to memory of 4044 100 cmd.exe 105 PID 100 wrote to memory of 4044 100 cmd.exe 105 PID 100 wrote to memory of 4044 100 cmd.exe 105 PID 100 wrote to memory of 3444 100 cmd.exe 106 PID 100 wrote to memory of 3444 100 cmd.exe 106 PID 100 wrote to memory of 3444 100 cmd.exe 106 PID 100 wrote to memory of 2384 100 cmd.exe 107 PID 100 wrote to memory of 2384 100 cmd.exe 107 PID 100 wrote to memory of 2384 100 cmd.exe 107 PID 100 wrote to memory of 636 100 cmd.exe 108 PID 100 wrote to memory of 636 100 cmd.exe 108 PID 100 wrote to memory of 636 100 cmd.exe 108 PID 100 wrote to memory of 4220 100 cmd.exe 109 PID 100 wrote to memory of 4220 100 cmd.exe 109 PID 100 wrote to memory of 4220 100 cmd.exe 109 PID 100 wrote to memory of 1804 100 cmd.exe 110 PID 100 wrote to memory of 1804 100 cmd.exe 110 PID 100 wrote to memory of 1804 100 cmd.exe 110 PID 100 wrote to memory of 224 100 cmd.exe 111 PID 100 wrote to memory of 224 100 cmd.exe 111 PID 100 wrote to memory of 224 100 cmd.exe 111 PID 100 wrote to memory of 4376 100 cmd.exe 112 PID 100 wrote to memory of 4376 100 cmd.exe 112 PID 100 wrote to memory of 4376 100 cmd.exe 112 PID 100 wrote to memory of 4848 100 cmd.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\!m.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\anti.exeanti.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K fence.bat3⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:5436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:5880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:5948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:6076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:5856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:5696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:5872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:5972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:5780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:4384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:5852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:5280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:4968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:6052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:5556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:5496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:6124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:5764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:6108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:6116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:5652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:5232
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4724
-
-
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- Delays execution with timeout.exe
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\PurchaseOrder.exePurchaseOrder.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\PurchaseOrder.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TESAYt.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TESAYt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp99F9.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
-
C:\Windows\SysWOW64\cipher.execipher /k /h /e C:\Users\Admin\Desktop\*3⤵PID:2284
-
-
C:\Windows\SysWOW64\cipher.execipher C:\Users\Admin\Desktop\*3⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\doc.html3⤵PID:2224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff898df46f8,0x7ff898df4708,0x7ff898df47184⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,7750391202580018676,6861515585448283031,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:24⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,7750391202580018676,6861515585448283031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\infected.html3⤵
- Manipulates Digital Signatures
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff898df46f8,0x7ff898df4708,0x7ff898df47184⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:24⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:84⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:14⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:14⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:14⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:14⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:14⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:14⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:84⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:14⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:14⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6180 /prefetch:84⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:14⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13860057195215155839,12915013909268297757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:14⤵PID:2328
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\butdes.exebutdes.exe3⤵
- Executes dropped EXE
PID:5916 -
C:\Users\Admin\AppData\Local\Temp\is-1TKQ2.tmp\butdes.tmp"C:\Users\Admin\AppData\Local\Temp\is-1TKQ2.tmp\butdes.tmp" /SL5="$20196,2719719,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\butdes.exe"4⤵
- Executes dropped EXE
PID:828
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\flydes.exeflydes.exe3⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\is-Q0R03.tmp\flydes.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q0R03.tmp\flydes.tmp" /SL5="$2019A,595662,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\flydes.exe"4⤵
- Executes dropped EXE
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\i.exei.exe3⤵
- Executes dropped EXE
PID:5816
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:5760
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\gx.exegx.exe3⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\7zS876FB498\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS876FB498\setup.exe --server-tracking-blob=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4⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\7zS876FB498\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS876FB498\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=112.0.5197.115 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x6e0d1b54,0x6e0d1b60,0x6e0d1b6c5⤵PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe" --version5⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"5⤵PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\assistant\assistant_installer.exe" --version5⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=73.0.3856.382 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0x1174f48,0x1174f58,0x1174f646⤵PID:3420
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\bundle.exebundle.exe3⤵PID:5776
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\rckdck.exerckdck.exe3⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\avg.exeavg.exe3⤵PID:5820
-
C:\Users\Admin\AppData\Local\Temp\ajD3AA.exe"C:\Users\Admin\AppData\Local\Temp\ajD3AA.exe" /relaunch=8 /was_elevated=1 /tagdata4⤵PID:4256
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x420 0x3dc1⤵PID:320
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD54da7ace7375e35f1448105c6e201ce32
SHA1941808a82908d0add51a624abe2a3640d9e60141
SHA2563353b006a60e27f70bdd1d187213758b2bd47e64e96a10b9c2747070653606cb
SHA51279c3c2e965eb9e14b5a11312f69de22054546d32c255545697e4a9ae4bd47b3d983877d99810bb085975ee9880d8c2ae642e0ab46d78e2af0408b74b930ae896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5f31fff06fb3a20fbd7353df563f8785c
SHA1e9f8a42e66b124727efb4637db9e9caa8e0d135f
SHA2564caa6df0c099c36f1e7652cc07b379747857b507a846291f7205151162aa2b8b
SHA512467162d602da635a99918e277fb4523f86857d6578be7f94f9063127555a28a2b23ec495145f43c1f9aa21f5cc6abc3852c50cfc1c7911a674b273fc4cadbf9f
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD514de3e35b78497b00891a4023f980941
SHA1fd2b903e76040a4c9b3c34b09e08277fb081e52a
SHA256a296925f67a0ad68ff5b2bf22e1d7f1c803bf31388414b23fef870c6cc5eb5f1
SHA51267011006da9f65d3a5ec988adf55dbf0d1f2e15b0789c5f6bb66f605fc16fc3c95d3bdc31e6ab15c6340c91a0ed7ff17403db20bef2a4002772e7c762c1393ff
-
Filesize
4KB
MD5a67000fec9cf5acaed5c72edd23f4a4e
SHA1207aea6d43f11f6698b0dd5352997a53a780637f
SHA256d6132ce07c46d0744745e5adf66ec566911bdd1e59f44b4333a78be994d2b2dd
SHA512cf6d7fe8820b2dfacb78a84df32a6068086d80d4ec7ac6349604154633c42ba7e67c95db2678fdceeb49acb43adba9bf803b4d6dd0cc5babfbf119c3b84124e0
-
Filesize
6KB
MD574518879389ad537c1568eff1ec8d148
SHA19b9a14520118425cd2714ae0922752e7d789f639
SHA2569d27bd4cf354cbf318dcaacdc8c1744496532375488fc1c836610cc50240e3a5
SHA5120532d8d8c4bfcea0a15f56ca97913508ec01c8d7f1c0a807ae6cabdf35604635f030ab81f74ca881c5b2750bbe4104efa26b8bae7faaeea0d7b5858289affab1
-
Filesize
5KB
MD58462b59c606842b92410d9bcfc68d84d
SHA1649e137e429041514d8461a2ae054276cdef9909
SHA2562da08d89ad6b96b2b857734d8126d4fed6f4c917b0f3e62ef075a3e3eaf24d8b
SHA51276a58a64fe82535d710cca97b3512196953cab2ac67597fb087df32d87221217a5b5f6ff899a9c6e490bf0933492fe800f280133f856e24a20dc5b10b208f0f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD56cc1f69e3518f7606e91648b81234f7d
SHA13091cd0ce317fb3bfd97764348ed912ee454f192
SHA2566f987f4cdf4bc22ac7f7fb6891353b87dc6b34a1b12498102c08bc9ff5f28df2
SHA512e949a3f780b6eb6aa70982986deaeb223053d6ab08af2fc89cde5c8ea6fab0dfae308b8977b4da42253a12c3aa8d68460adf95d402df47748ec3537256d5ba83
-
Filesize
10KB
MD50fcebd74fd3d9b741545c06ca008c561
SHA1fe51ba9c03f9ab82db5269adefb200b4c901e46b
SHA25691e12ba74a7cfcbd770875ddc20a4d8452b5e49f6c44c085341abf355ace54c2
SHA5124d7e07c8a4f027a8e2a9c4a759f3660b1cd7a566bbae731847bdfeaa5e88667b13521fca6c4a69b9eaaed9fb73ef4af59935de2320e4c9752f247fd9d1b4cf79
-
Filesize
10KB
MD5a00d0c67366b8ae407b77a35a4a06b08
SHA1b9b91ba8a4d8c70dab4123f7bf99f3e594a82199
SHA2568d0ee7ec710e00ca53620948c9e36ab513c630bee89a13ba7c509a6a85e41a81
SHA512c548113721110343ffb4e94387278d407077ce202b8154fdfaf0a3161fa9f8b2e33903642a118b4605b5c5f1d4373bf2d913a4e4b6e81ecda744c9b75314d364
-
Filesize
18KB
MD5ac28370b062ec4e36c4258c30fff1cdb
SHA1ca83e5296f66cde114d23925d1930617fa6c283c
SHA2569a265f4dab8aca19e6fc499ed45e67f0f43d417c0f43707fa6399b79b1d9144c
SHA512fe26e94b40619cd0fe02fdd6bd7cda062b13e4f1b228c5d7ed32eb93815a5677248041107539fefc52d3a357d8740c06edc69585e5d9bb8e022a1b9d45f13581
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202409160828501\additional_file0.tmp
Filesize1.4MB
MD5e9a2209b61f4be34f25069a6e54affea
SHA16368b0a81608c701b06b97aeff194ce88fd0e3c0
SHA256e950f17f4181009eeafa9f5306e8a9dfd26d88ca63b1838f44ff0efc738e7d1f
SHA51259e46277ca79a43ed8b0a25b24eff013e251a75f90587e013b9c12851e5dd7283b6172f7d48583982f6a32069457778ee440025c1c754bf7bb6ce8ae1d2c3fc5
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\!m.bat
Filesize1KB
MD561b00fa9f8f30bb8324ca1a5fd042c73
SHA144afb5a0f288d8baeb0f667ca7e978e48174e36c
SHA2567cf9aa4c080eac793113afce38a5c8081d19c51f68955ed06ebba73de7509b51
SHA5123db8cb8fe6f60b0424217cb50a409b5943e498313c6f8fbeb1074e945dfb92053313509235d5f13f98edbf0cf76bb9aefb0d810fcd51fbe9e4e52b9162135e2f
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\PurchaseOrder.exe
Filesize934KB
MD5f7f32729079353000cd97b90aa314cc1
SHA121dbddeea2b634263c8fbf0d6178a9751d2467b8
SHA2568e29aa00863b1746ba25132f7ecb7bcb869d3a7e647dc8d6d3255491c5ac5212
SHA5122c40c12b81e7c377ddf0a6691ebeedc895dcf02c9211a1563b840de735fab77968565b1d3d0c40cc0b2b583fd4bfa1c69f995fca758ea85f548bf5797b5bf847
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\anti.exe
Filesize1.9MB
MD5cb02c0438f3f4ddabce36f8a26b0b961
SHA148c4fcb17e93b74030415996c0ec5c57b830ea53
SHA25664677f7767d6e791341b2eac7b43df90d39d9bdf26d21358578d2d38037e2c32
SHA512373f91981832cd9a1ff0b8744b43c7574b72971b5b6b19ea1f4665b6c878f7a1c7834ac08b92e0eca299eb4b590bf10f48a0485350a77a5f85fc3d2dd6913db3
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\avg.exe
Filesize5.8MB
MD50dc93e1f58cbb736598ce7fa7ecefa33
SHA16e539aab5faf7d4ce044c2905a9c27d4393bae30
SHA2564ec941f22985fee21d2f9d2ae590d5dafebed9a4cf55272b688afe472d454d36
SHA51273617da787e51609ee779a12fb75fb9eac6ed6e99fd1f4c5c02ff18109747de91a791b1a389434edfe8b96e5b40340f986b8f7b88eac3a330b683dec565a7eff
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\bundle.exe
Filesize429KB
MD5ae4581af98a5b38bce860f76223cb7c9
SHA16aa1e2cce517e5914a47816ef8ca79620e50e432
SHA2567c4b329a4018dc7e927a7d1078c846706efae6e6577f6809defaa51b636e7267
SHA51211ad90a030999bbb727dbfde7943d27f2442c247633cde5f9696e89796b0f750f85a9be96f01fa3fd1ec97653a334b1376d6bb76d9e43424cabe3a03893ecf04
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\butdes.exe
Filesize2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\code.js
Filesize4KB
MD5016bf2cf2bad527f1f1ea557408cb036
SHA123ab649b9fb99da8db407304ce9ca04f2b50c7b4
SHA25617bb814cfaa135628fd77aa8a017e4b0dcd3c266b8cdca99e4d7de5d215643c0
SHA512ac2d4f51b0b1da3c544f08b7d0618b50514509841f81bc9dad03329d5c1a90e205795a51ca59522d3aa660fb60faae19803eceeeea57f141217a6701a70510e7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\doc.html
Filesize15KB
MD55622e7755e5f6585a965396b0d528475
SHA1b059dc59658822334e39323b37082374e8eeaac4
SHA256080cb8ef0cbf5a5de9163b365eec8b29538e579f14a9caa45c0f11bc173c4147
SHA51262f5abda3473ca043bf126eed9d0bcc0f775b5ac5f85b4fe52d1d656f476f62188d22cf79b229059a5d05e9258980c787cb755f08ca86e24e5f48655b5447f8e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\download.jpg
Filesize8KB
MD501a5131931ef35acecbe557ba13f3954
SHA1c7afc7590d469432704d963ffcee31ad8bcfc175
SHA256d364872ddde28d81d23bb3b08f9e86f921b542f3a35fcaf12549cf5666462bd0
SHA512ce32352484d676bd0f47c24808707c603fe9f09e41afd63d90f07599f13a5e32c73b0970a9964632f76f5843dda87a033340ee12fadd87b9f219329d0c69b02e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\favicon.ico
Filesize5KB
MD5e0c7cc30d8f9a3cf0140bf838198571b
SHA12494a9ab234b90ff0a3cc2dbc152483fb540afd3
SHA25673bb7f4a70650054fb42f4c7ab85d9a683253a0df26703ecd4a2bb3155d93cb4
SHA5127b87a3296fd984d89dacfa70bdc274ed9faf553c3e086d3e865ed7a2e55f92fbb55bd270a5863ebb6b95f3ce26d321b5936665741300676863f40111b95a6e75
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\fence.bat
Filesize167B
MD56465a5431e01a80bf71aca9e9698e5b0
SHA1d56ed108f13a6c49d57f05e2bf698778fd0b98dc
SHA2561c5f05fecfc1f4fd508f1d3bbb93a47e8b8196b9eded5de7152a6fa57ca7580f
SHA512db7f64b8af595d0bf6fd142471868df6d29ec7cfbb49a7e0da63d9bc8ca8f319e4c41f2c7baeafe17a3679861163400ccb36c18617982b244aaf482e9c264e55
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\flydes.exe
Filesize833KB
MD5b401505e8008994bf2a14fdf0deac874
SHA1e4f7f375b1e88dd71a0274a997ed5d9491bde068
SHA2566bcf6b84d71737787e3cc8d9d0eed9720f388cc2d0337832a7e8ca3c6f455a41
SHA5121bca98547ecf5a98d42b1d77cff50ca79ee560c893b2470aeb86887fef6e40a5ccdb72956f04a1d2a862827eebd3b7746e3043f3e6209597dcde9385ed55cc11
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\fries.jpg
Filesize12KB
MD5c4d9d3cd21ef4de91abc95f99c4bc7dc
SHA1b2cf457237c44c824068727b8440fe6a352a360c
SHA2566fd1c3bde9a6a478e39d1cf2121e980c0bcf59454fe1673d707aa70170953bc9
SHA512d10fbb0bdfb30160484950aa58bd2f97c38cf2d0914550b4041c9acd273e8013920ef1ee74216f92437a44ab81111a4c70ed3dc2df680ee4d187c22557900ee7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\gx.exe
Filesize3.1MB
MD580bf3bf3b76c80235d24f7c698239089
SHA17f6071b502df985580e7c469c6d092472e355765
SHA2562b95e56af10406fbd3ecee38dab9e9c4a9b990d087f2ad2d7b1981c087829da2
SHA512076b8b6a80ea15738ce682cc715792546582d7a74f971f94f6b5b9cf8164f01280322baec7f72894ac4b8d63b9f2f6074e8fc5e47880ef6c0b57a47beef3581a
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\i.exe
Filesize12KB
MD5cea5426da515d43c88132a133f83ce68
SHA10c224d0bb777f1e3b186fdf58cc82860d96805cc
SHA2562be7a0865ded1c0bd1f92d5e09bb7b37a9e36a40487a687e0359c93878611a78
SHA5124c1f25147222c84dff513bebf00e828719454ad634ef9380cfc7835f0457a718b4b437ecb60c1fa72a7f83fbb67e1ddfcd225194eedda77034c72f8c752c642c
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\images.jpg
Filesize13KB
MD549f4fe0c8646909c7cf87adf68d896fd
SHA19193264c38e5ed9fa0f5be1d79f802cf946a74cf
SHA2569292dfcddc9e88e5dbc095ceeb83ce23400a3405a4d47fffc80656941c87d5ec
SHA5129df4db8c958110cea66f627170919346ed673d3c13aa55292484fc74ebac2864b0292cd4d66d35957b4b2740b2fe30ddfb9d9e04115d655fb58bf39e100d285e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\infected.html
Filesize972B
MD5f48be9db7436f1c53508f1ad70064459
SHA116b20d3933cc6398859f1334a848982cccfd8501
SHA256f79460fad80962fabe51f271a2ad33fd54c418fbb0a8646c1d78654696d7d7b2
SHA512c7870b4fd16827817fa16c68f9d1a51270cfd9dc052861977a12ffcbc91a1668c82f168f8b33661d68579cfed766e15d0e436794d0eed164946eb9927355b638
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\nuggets.webp
Filesize32KB
MD5e40209599b592630dcac551daeb6b849
SHA1851150b573f94f07e459c320d72505e52c3e74f0
SHA2563c9aefa00fb2073763e807a7eccac687dcc26598f68564e9f9cf9ffdcd90a2be
SHA5126da5895f2833a18ddb58ba4a9e78dd0b3047475cae248e974dc45d839f02c62772a6ba6dfe51dd9a37f29b7ec9780e799f60f0e476655006dec693164e17eec2
-
C:\Users\Admin\AppData\Local\Temp\2024-09-16_5d20d04ed7f6024bed1388022efd5eb7_cobalt-strike_cobaltstrike_hijackloader_poet-rat_0de38ba3-0ca3-4554-a8e7-8dd1422058d6\rckdck.exe
Filesize5.7MB
MD5e92ee999533998d0a7e7eeb7ee27cc1a
SHA1903257ae4f0b055170e631f8306d143d6af5ebac
SHA25660e28665e9a59738cd5ff1086238c9f08690c170b1927d478ed23acd10afa04d
SHA512ef0759f9b6bd3608cc64a59e6c4be73353dfa63e33f2cb8604a7e83f849f2686d399956a7b26d30bd1eb58003bf6c32d9be01435ac463b431d99d2d5f64782c6
-
Filesize
6.4MB
MD5defd30ea336650cc29c0c79fad6fa6b5
SHA1935d871ed86456c6dd3c83136dc2d1bda5988ff3
SHA256015a13bd912728e463df6807019b1914dffc3e6735830472e3287150a02e13f4
SHA5128c6ebbf398fb44ff2254db5a7a2ffbc8803120fa93fa6b72c356c6e8eca45935ab973fe3c90d52d5a7691365caf5b41fe2702b6c76a61a0726faccc392c40e54
-
Filesize
5.9MB
MD5640ed3115c855d32ee1731c54702eab7
SHA11ac749b52794cbadfec8d9219530e9a79fc9427c
SHA25629b4cabc7a0e9dffbc2395b976749be0aad88357dd3b1d7e0cfc9b0c645421a3
SHA512bebe55fdbb363b78c4a6371304f65b89e03a03cee5a8ebceee1681261d8df64a0de36888ed763c3a607ae2732ab54e2e41edb624f37a7fdf8755c40e6bb96f53
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
127KB
MD52027121c3cdeb1a1f8a5f539d1fe2e28
SHA1bcf79f49f8fc4c6049f33748ded21ec3471002c2
SHA2561dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1
SHA5125b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c
-
Filesize
36KB
MD5f840a9ddd319ee8c3da5190257abde5b
SHA13e868939239a5c6ef9acae10e1af721e4f99f24b
SHA256ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a
SHA5128e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a
-
Filesize
124KB
MD5c7dd6f9d6d36f1fae695f9087e30b34c
SHA146f45a0e81f8c08393027d5d3209cf702832d7f5
SHA256516db89be8e4fb79c01b605ca34116b7cc4ce9012514dad6452666e5a002f135
SHA5120502918dad97281eee1aef672d53eff22128d90d2366bd01c94032f1288ae063a9af01f1730de63415ac493765a88b8563629cb359c800a2cf1644cd8408df1e
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
5.0MB
MD5cbece3c2194c72ccb5970bc76f5b257e
SHA1b33cddd26253cf1fbbf7e63f9529fc0f8ad270cb
SHA2565217ba740476f6b332769e9e84b8f2ecdec8c1f4ad7145c9a9b802011644353a
SHA5124f3de0fe5a2ab6d1e7685a79b6cfbdc69740bd7853a52afb5bb189ad21b8b899cea19522ac1e7e02dbd4e58fc3794e7ae3cb9faa429988573ec5b5748b77af3f
-
Filesize
2.1MB
MD5d21ae3f86fc69c1580175b7177484fa7
SHA12ed2c1f5c92ff6daa5ea785a44a6085a105ae822
SHA256a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450
SHA512eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f
-
Filesize
126KB
MD52597a829e06eb9616af49fcd8052b8bd
SHA1871801aba3a75f95b10701f31303de705cb0bc5a
SHA2567359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87
SHA5128e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35
-
Filesize
195KB
MD534939c7b38bffedbf9b9ed444d689bc9
SHA181d844048f7b11cafd7561b7242af56e92825697
SHA256b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0
SHA512bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953
-
Filesize
93KB
MD57b4bd3b8ad6e913952f8ed1ceef40cd4
SHA1b15c0b90247a5066bd06d094fa41a73f0f931cb8
SHA256a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754
SHA512d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2
-
Filesize
1KB
MD5f769acdcf269f65744e2146c115258d3
SHA13b83c0078d538cd89ec429a7eeaeef4d6e0625cd
SHA256ffe2108b3160d73c713b3894312976be92d3c45c3711d51f614900edcf0d7835
SHA5120fd4caf870a30bee0db9c84ff8e618627f6d617615087dbbf3447b3637d132fe3c1fad0cd520d0322f7239a9255f7e65b88bb29f0845dd2137904265361fdbb9
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\E4E243954C0F0D5AB78BB7FCFEBEA25443D32937
Filesize1KB
MD5f7d16e743a6b4b97f33df04d82127720
SHA1792f40a09a1a139e885b489b78840bba81ced48e
SHA2566b368ac43c64c843ea548b6f5bd5d1b297314c0e7259ec0acc6291cf5e1fad34
SHA51277e6cdd3c6e53ee98ea368533c27c426f9b185e552eb37ce4446c9effee52d80ba9c5d19d51a0112fe7f2c640a3ac869d0c2355ac33019997e2d01bcbc946a31