Overview
overview
10Static
static
3ToX_Free_U...ra.zip
windows10-2004-x64
10ToX Free U...I2.dll
windows10-2004-x64
1ToX Free U...on.dll
windows10-2004-x64
1ToX Free U...on.xml
windows10-2004-x64
1ToX Free U...ty.exe
windows10-2004-x64
3ToX Free U...config
windows10-2004-x64
3ToX Free U...ty.pdb
windows10-2004-x64
3Analysis
-
max time kernel
350s -
max time network
319s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 13:20
Static task
static1
Behavioral task
behavioral1
Sample
ToX_Free_Utility_v2.0.New.Era.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
ToX Free Utility V2.0/Guna.UI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ToX Free Utility V2.0/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
ToX Free Utility V2.0/Newtonsoft.Json.xml
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ToX Free Utility V2.0/ToX Free Utility.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
ToX Free Utility V2.0/ToX Free Utility.exe.config
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
ToX Free Utility V2.0/ToX Free Utility.pdb
Resource
win10v2004-20241007-en
General
-
Target
ToX_Free_Utility_v2.0.New.Era.zip
-
Size
6.9MB
-
MD5
29e316fe90a629ff4f241e2924411d2e
-
SHA1
c061101cbdd214b2e4e9fd1d42a95f18ae75fc43
-
SHA256
f9d4b3edcdf3085dacdf7ffb3e794b53f3dc0bb5f6f227837ae5c828a97ac478
-
SHA512
bf2824ed87884aab5b66f7ce8e69e0abb9648fabfc0e1ea28edee26b1a6c6b9f23d94881481fe263200e0b6f3d60a0227c311b516a93695534b6edfba2ae6513
-
SSDEEP
196608:Z9H2mzkUH1Zsk6jDepvXdOGlRDU2ELyvjecsqENaZaHC:Ww/sk6jSpvXfvU2EL6yMENaX
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 52 2340 powershell.exe 54 2340 powershell.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Powershell Invoke Web Request.
pid Process 2340 powershell.exe 3552 powershell.exe 4916 powershell.exe 3068 powershell.exe 5068 powershell.exe 4956 powershell.exe 2012 powershell.exe 4620 powershell.exe 1436 powershell.exe 1388 powershell.exe 3648 powershell.exe -
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions\CpuPriorityClass = "4" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions\IoPriority = "3" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions reg.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation setup.exe -
Deletes itself 1 IoCs
pid Process 2544 ToX Free Utility.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 24 IoCs
pid Process 2544 ToX Free Utility.exe 2808 MicrosoftEdgeSetup.exe 3936 MicrosoftEdgeUpdate.exe 1112 MicrosoftEdgeUpdate.exe 3660 MicrosoftEdgeUpdate.exe 924 MicrosoftEdgeUpdateComRegisterShell64.exe 832 MicrosoftEdgeUpdateComRegisterShell64.exe 1148 MicrosoftEdgeUpdateComRegisterShell64.exe 3688 MicrosoftEdgeUpdate.exe 1824 MicrosoftEdgeUpdate.exe 2932 MicrosoftEdgeUpdate.exe 1664 MicrosoftEdgeUpdate.exe 4916 MicrosoftEdge_X64_130.0.2849.80.exe 708 setup.exe 2936 setup.exe 1916 setup.exe 2744 setup.exe 4508 setup.exe 396 setup.exe 5024 setup.exe 2400 setup.exe 2788 setup.exe 2760 setup.exe 1688 MicrosoftEdgeUpdate.exe -
Loads dropped DLL 18 IoCs
pid Process 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 3936 MicrosoftEdgeUpdate.exe 1112 MicrosoftEdgeUpdate.exe 3660 MicrosoftEdgeUpdate.exe 924 MicrosoftEdgeUpdateComRegisterShell64.exe 3660 MicrosoftEdgeUpdate.exe 832 MicrosoftEdgeUpdateComRegisterShell64.exe 3660 MicrosoftEdgeUpdate.exe 1148 MicrosoftEdgeUpdateComRegisterShell64.exe 3660 MicrosoftEdgeUpdate.exe 3688 MicrosoftEdgeUpdate.exe 1824 MicrosoftEdgeUpdate.exe 2932 MicrosoftEdgeUpdate.exe 2932 MicrosoftEdgeUpdate.exe 1824 MicrosoftEdgeUpdate.exe 1664 MicrosoftEdgeUpdate.exe 1688 MicrosoftEdgeUpdate.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 53 raw.githubusercontent.com 54 raw.githubusercontent.com -
Power Settings 1 TTPs 3 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1844 powercfg.exe 2000 powercfg.exe 1580 powercfg.exe -
Checks system information in the registry 2 TTPs 10 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\AdSelectionAttestationsPreloaded\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\identity_proxy\win10\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\cs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\dual_engine_adapter_x64.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\msedge.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\da.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\he.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\msedge.exe.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\el.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\d3dcompiler_47.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\libGLESv2.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Sigma\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\nb.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\identity_proxy\win11\identity_helper.Sparse.Dev.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\03203df8-8021-43bf-8bba-466ae2028e5a.tmp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\pl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\telclient.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\vk_swiftshader_icd.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\oneds.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Mu\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Trust Protection Lists\Sigma\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\ca-Es-VALENCIA.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe MicrosoftEdge_X64_130.0.2849.80.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\tr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Mu\Content setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\vccorlib140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\onnxruntime.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\is.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\tt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\VisualElements\SmallLogoDev.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\telclient.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\bs.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\te.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Trust Protection Lists\Sigma\Analytics setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\MEIPreload\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Mu\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\AdSelectionAttestationsPreloaded\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\ru.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\cy.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\ar.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\sr.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU371F.tmp\msedgeupdateres_kn.dll MicrosoftEdgeSetup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\ko.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Trust Protection Lists\Mu\CompatExceptions setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Trust Protection Lists\Sigma\Entities setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EU371F.tmp\msedgeupdateres_iw.dll MicrosoftEdgeSetup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\as.pak setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\it.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\ml.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\130.0.2849.80\Locales\ne.pak setup.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 3 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 4372 powershell.exe 1856 powershell.exe 2860 powershell.exe -
Launches sc.exe 32 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5048 sc.exe 1156 sc.exe 2732 sc.exe 4184 sc.exe 4340 sc.exe 1032 sc.exe 516 sc.exe 3320 sc.exe 180 sc.exe 2860 sc.exe 4536 sc.exe 3664 sc.exe 4992 sc.exe 4636 sc.exe 4796 sc.exe 4688 sc.exe 1916 sc.exe 2040 sc.exe 3552 sc.exe 4276 sc.exe 2924 sc.exe 944 sc.exe 2936 sc.exe 3988 sc.exe 2808 sc.exe 700 sc.exe 3076 sc.exe 968 sc.exe 3476 sc.exe 4916 sc.exe 4856 sc.exe 2540 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1688 MicrosoftEdgeUpdate.exe 3688 MicrosoftEdgeUpdate.exe 1664 MicrosoftEdgeUpdate.exe 908 cmd.exe 1548 reg.exe 3068 cmd.exe 3740 reg.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LocationInformation reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Storport reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties reg.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties reg.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\Storport reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Address reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport\PowerCycleCount reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UINumber reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Address reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\DefaultRequestFlags reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\Storport\InitialTimestamp reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Address reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Mfg reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters reg.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\AttributesTableCache reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ContainerID reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ClassGUID reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\Storport reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ClassGUID reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UINumber reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ClassGUID reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LocationInformation reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LocationInformation reg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Address reg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI reg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\Storport reg.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ToX Free Utility.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ToX Free Utility.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4536 timeout.exe 4716 timeout.exe -
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ToX Free Utility.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ToX Free Utility.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ToX Free Utility.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4700 ipconfig.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\130.0.2849.80\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ = "IPolicyStatusValue" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9C2B807-7731-4F34-81B7-44FF7779522B}\ = "Interface {C9C2B807-7731-4F34-81B7-44FF7779522B}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0E8770A1-043A-4818-BB5C-41862B93EEFF}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\NumMethods\ = "7" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID\ = "MicrosoftEdgeUpdate.CredentialDialogMachine.1.0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.html\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.pdf setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ = "IPolicyStatus2" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.15\\MicrosoftEdgeUpdateBroker.exe\"" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{77857D02-7A25-4B67-9266-3E122A8F39E4}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgePDF\Application\ApplicationName = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ie_to_edge_bho.IEToEdgeBHO\CurVer\ = "ie_to_edge_bho.IEToEdgeBHO.1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ = "IAppCommandWeb" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ = "IPolicyStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\Elevation\Enabled = "1" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\NumMethods\ = "11" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\NumMethods\ = "10" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{375D3B39-152A-41E1-BF1B-B648933F26D0} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSEdgeMHT\Application\AppUserModelId = "MSEdge" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\MIME\Database\Content Type\ setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.PolicyStatusMachineFallback.1.0\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32\ = "{0E8770A1-043A-4818-BB5C-41862B93EEFF}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\Elevation\IconReference = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.195.15\\msedgeupdate.dll,-1004" MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe 2544 ToX Free Utility.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1208 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1208 7zFM.exe Token: 35 1208 7zFM.exe Token: SeSecurityPrivilege 1208 7zFM.exe Token: SeDebugPrivilege 2544 ToX Free Utility.exe Token: SeShutdownPrivilege 1844 powercfg.exe Token: SeCreatePagefilePrivilege 1844 powercfg.exe Token: SeShutdownPrivilege 2000 powercfg.exe Token: SeCreatePagefilePrivilege 2000 powercfg.exe Token: SeShutdownPrivilege 1580 powercfg.exe Token: SeCreatePagefilePrivilege 1580 powercfg.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 3936 MicrosoftEdgeUpdate.exe Token: SeIncreaseQuotaPrivilege 1860 WMIC.exe Token: SeSecurityPrivilege 1860 WMIC.exe Token: SeTakeOwnershipPrivilege 1860 WMIC.exe Token: SeLoadDriverPrivilege 1860 WMIC.exe Token: SeSystemProfilePrivilege 1860 WMIC.exe Token: SeSystemtimePrivilege 1860 WMIC.exe Token: SeProfSingleProcessPrivilege 1860 WMIC.exe Token: SeIncBasePriorityPrivilege 1860 WMIC.exe Token: SeCreatePagefilePrivilege 1860 WMIC.exe Token: SeBackupPrivilege 1860 WMIC.exe Token: SeRestorePrivilege 1860 WMIC.exe Token: SeShutdownPrivilege 1860 WMIC.exe Token: SeDebugPrivilege 1860 WMIC.exe Token: SeSystemEnvironmentPrivilege 1860 WMIC.exe Token: SeRemoteShutdownPrivilege 1860 WMIC.exe Token: SeUndockPrivilege 1860 WMIC.exe Token: SeManageVolumePrivilege 1860 WMIC.exe Token: 33 1860 WMIC.exe Token: 34 1860 WMIC.exe Token: 35 1860 WMIC.exe Token: 36 1860 WMIC.exe Token: SeIncreaseQuotaPrivilege 1860 WMIC.exe Token: SeSecurityPrivilege 1860 WMIC.exe Token: SeTakeOwnershipPrivilege 1860 WMIC.exe Token: SeLoadDriverPrivilege 1860 WMIC.exe Token: SeSystemProfilePrivilege 1860 WMIC.exe Token: SeSystemtimePrivilege 1860 WMIC.exe Token: SeProfSingleProcessPrivilege 1860 WMIC.exe Token: SeIncBasePriorityPrivilege 1860 WMIC.exe Token: SeCreatePagefilePrivilege 1860 WMIC.exe Token: SeBackupPrivilege 1860 WMIC.exe Token: SeRestorePrivilege 1860 WMIC.exe Token: SeShutdownPrivilege 1860 WMIC.exe Token: SeDebugPrivilege 1860 WMIC.exe Token: SeSystemEnvironmentPrivilege 1860 WMIC.exe Token: SeRemoteShutdownPrivilege 1860 WMIC.exe Token: SeUndockPrivilege 1860 WMIC.exe Token: SeManageVolumePrivilege 1860 WMIC.exe Token: 33 1860 WMIC.exe Token: 34 1860 WMIC.exe Token: 35 1860 WMIC.exe Token: 36 1860 WMIC.exe Token: SeIncreaseQuotaPrivilege 3044 WMIC.exe Token: SeSecurityPrivilege 3044 WMIC.exe Token: SeTakeOwnershipPrivilege 3044 WMIC.exe Token: SeLoadDriverPrivilege 3044 WMIC.exe Token: SeSystemProfilePrivilege 3044 WMIC.exe Token: SeSystemtimePrivilege 3044 WMIC.exe Token: SeProfSingleProcessPrivilege 3044 WMIC.exe Token: SeIncBasePriorityPrivilege 3044 WMIC.exe Token: SeCreatePagefilePrivilege 3044 WMIC.exe Token: SeBackupPrivilege 3044 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 7zFM.exe 1208 7zFM.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 MicrosoftEdgeSetup.exe 3936 MicrosoftEdgeUpdate.exe 1112 MicrosoftEdgeUpdate.exe 3660 MicrosoftEdgeUpdate.exe 3688 MicrosoftEdgeUpdate.exe 1824 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4492 2544 ToX Free Utility.exe 116 PID 2544 wrote to memory of 4492 2544 ToX Free Utility.exe 116 PID 2544 wrote to memory of 4492 2544 ToX Free Utility.exe 116 PID 4492 wrote to memory of 1844 4492 cmd.exe 118 PID 4492 wrote to memory of 1844 4492 cmd.exe 118 PID 4492 wrote to memory of 1844 4492 cmd.exe 118 PID 4492 wrote to memory of 2000 4492 cmd.exe 119 PID 4492 wrote to memory of 2000 4492 cmd.exe 119 PID 4492 wrote to memory of 2000 4492 cmd.exe 119 PID 4492 wrote to memory of 1580 4492 cmd.exe 120 PID 4492 wrote to memory of 1580 4492 cmd.exe 120 PID 4492 wrote to memory of 1580 4492 cmd.exe 120 PID 2544 wrote to memory of 2560 2544 ToX Free Utility.exe 121 PID 2544 wrote to memory of 2560 2544 ToX Free Utility.exe 121 PID 2544 wrote to memory of 2560 2544 ToX Free Utility.exe 121 PID 2560 wrote to memory of 4104 2560 cmd.exe 123 PID 2560 wrote to memory of 4104 2560 cmd.exe 123 PID 2560 wrote to memory of 4104 2560 cmd.exe 123 PID 2560 wrote to memory of 1044 2560 cmd.exe 124 PID 2560 wrote to memory of 1044 2560 cmd.exe 124 PID 2560 wrote to memory of 1044 2560 cmd.exe 124 PID 2560 wrote to memory of 2700 2560 cmd.exe 125 PID 2560 wrote to memory of 2700 2560 cmd.exe 125 PID 2560 wrote to memory of 2700 2560 cmd.exe 125 PID 2560 wrote to memory of 4748 2560 cmd.exe 126 PID 2560 wrote to memory of 4748 2560 cmd.exe 126 PID 2560 wrote to memory of 4748 2560 cmd.exe 126 PID 2544 wrote to memory of 2568 2544 ToX Free Utility.exe 127 PID 2544 wrote to memory of 2568 2544 ToX Free Utility.exe 127 PID 2544 wrote to memory of 2568 2544 ToX Free Utility.exe 127 PID 2568 wrote to memory of 944 2568 cmd.exe 129 PID 2568 wrote to memory of 944 2568 cmd.exe 129 PID 2568 wrote to memory of 944 2568 cmd.exe 129 PID 2568 wrote to memory of 4340 2568 cmd.exe 130 PID 2568 wrote to memory of 4340 2568 cmd.exe 130 PID 2568 wrote to memory of 4340 2568 cmd.exe 130 PID 2568 wrote to memory of 212 2568 cmd.exe 131 PID 2568 wrote to memory of 212 2568 cmd.exe 131 PID 2568 wrote to memory of 212 2568 cmd.exe 131 PID 2568 wrote to memory of 1936 2568 cmd.exe 132 PID 2568 wrote to memory of 1936 2568 cmd.exe 132 PID 2568 wrote to memory of 1936 2568 cmd.exe 132 PID 2568 wrote to memory of 5048 2568 cmd.exe 133 PID 2568 wrote to memory of 5048 2568 cmd.exe 133 PID 2568 wrote to memory of 5048 2568 cmd.exe 133 PID 2568 wrote to memory of 1724 2568 cmd.exe 134 PID 2568 wrote to memory of 1724 2568 cmd.exe 134 PID 2568 wrote to memory of 1724 2568 cmd.exe 134 PID 2568 wrote to memory of 1176 2568 cmd.exe 135 PID 2568 wrote to memory of 1176 2568 cmd.exe 135 PID 2568 wrote to memory of 1176 2568 cmd.exe 135 PID 2568 wrote to memory of 3440 2568 cmd.exe 136 PID 2568 wrote to memory of 3440 2568 cmd.exe 136 PID 2568 wrote to memory of 3440 2568 cmd.exe 136 PID 2568 wrote to memory of 3940 2568 cmd.exe 137 PID 2568 wrote to memory of 3940 2568 cmd.exe 137 PID 2568 wrote to memory of 3940 2568 cmd.exe 137 PID 2568 wrote to memory of 1952 2568 cmd.exe 138 PID 2568 wrote to memory of 1952 2568 cmd.exe 138 PID 2568 wrote to memory of 1952 2568 cmd.exe 138 PID 2568 wrote to memory of 4132 2568 cmd.exe 139 PID 2568 wrote to memory of 4132 2568 cmd.exe 139 PID 2568 wrote to memory of 4132 2568 cmd.exe 139 PID 2568 wrote to memory of 4780 2568 cmd.exe 140 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ToX_Free_Utility_v2.0.New.Era.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1208
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2308
-
C:\Users\Admin\Desktop\ToX Free Utility V2.0\ToX Free Utility.exe"C:\Users\Admin\Desktop\ToX Free Utility V2.0\ToX Free Utility.exe"1⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\powercfg.exepowercfg -duplicatescheme e9a42b02-d5df-448d-aa00-03f14749eb61 44444244-4444-4444-4444-4444444444203⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /changename 44444244-4444-4444-4444-444444444420 "ToX Free PowerPlan V2.0" "Designed To Improve Performance, Latency and Overall Responsivness."3⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg -SETACTIVE 44444244-4444-4444-4444-4444444444203⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\ApplicationManagement\AllowGameDVR" /v "value" /t REG_DWORD /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\GameDVR" /v "AllowGameDVR" /t REG_DWORD /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\System\GameConfigStore" /v "GameDVR_Enabled" /t REG_DWORD /d 00000000 /f3⤵PID:2700
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR" /v "AppCaptureEnabled" /t REG_DWORD /d 00000000 /f3⤵PID:4748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\sc.exesc stop WerSvc3⤵
- Launches sc.exe
PID:944
-
-
C:\Windows\SysWOW64\sc.exesc config WerSvc start= disabled3⤵
- Launches sc.exe
PID:4340
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\International\User Profile" /v "HttpAcceptLanguageOptOut" /t REG_DWORD /d "1" /f3⤵PID:212
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f3⤵PID:5048
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d 1 /f3⤵PID:1724
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\PCHealth\ErrorReporting" /v "DoReport" /t REG_DWORD /d "0" /f3⤵PID:1176
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo" /v "DisabledByGroupPolicy" /t REG_DWORD /d "1" /f3⤵PID:3440
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\HandwritingErrorReports" /v "PreventHandwritingErrorReports" /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\TabletPC" /v "PreventHandwritingDataSharing" /t REG_DWORD /d 1 /f3⤵PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "AutoApproveOSDumps" /t REG_DWORD /d 0 /f3⤵PID:4132
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD /d 1 /f3⤵PID:4780
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "DontSendAdditionalData" /t REG_DWORD /d 1 /f3⤵PID:1508
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\PCHealth\ErrorReporting" /v "ShowUI" /t REG_DWORD /d "0" /f3⤵PID:1536
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Control Panel\International\User Profile" /v "HttpAcceptLanguageOptOut" /t REG_DWORD /d "1" /f3⤵PID:4468
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v "Enabled" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t REG_DWORD /d "0" /f3⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d "1" /f3⤵PID:3040
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /v "DontSendAdditionalData" /t REG_DWORD /d "1" /f3⤵PID:5084
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting" /v "LoggingDisabled" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting\Consent" /v "DefaultConsent" /t REG_DWORD /d "0" /f3⤵PID:2184
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\Windows Error Reporting\Consent" /v "DefaultOverrideBehavior" /t REG_DWORD /d "1" /f3⤵PID:1932
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\Windows Error Reporting" /v "DontShowUI" /t REG_DWORD /d 1 /f3⤵PID:4292
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\PCHealth\ErrorReporting" /v "DoReport" /t REG_DWORD /d "0" /f3⤵PID:3540
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\AdvertisingInfo" /v "DisabledByGroupPolicy" /t REG_DWORD /d "1" /f3⤵PID:1904
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\HandwritingErrorReports" /v "PreventHandwritingErrorReports" /t REG_DWORD /d 1 /f3⤵PID:2116
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\TabletPC" /v "PreventHandwritingDataSharing" /t REG_DWORD /d 1 /f3⤵PID:2016
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "AutoApproveOSDumps" /t REG_DWORD /d 0 /f3⤵PID:2400
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "Disabled" /t REG_DWORD /d 1 /f3⤵PID:4376
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Error Reporting" /v "DontSendAdditionalData" /t REG_DWORD /d 1 /f3⤵PID:3616
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\W3SVC" /v Start /t REG_DWORD /d 0 /f3⤵PID:5112
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Microsoft\PCHealth\ErrorReporting" /v "ShowUI" /t REG_DWORD /d "0" /f3⤵PID:1112
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\SettingSync" /v "DisableSettingSync" /t REG_DWORD /d "2" /f3⤵
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\SettingSync" /v "DisableSettingSyncUserOverride" /t REG_DWORD /d "1" /f3⤵PID:2900
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\SettingSync" /v "DisableSyncOnPaidNetwork" /t REG_DWORD /d "1" /f3⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\FindMyDevice" /v "AllowFindMyDevice" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\FindMyDevice" /v "LocationSyncEnabled" /t REG_DWORD /d "0" /f3⤵PID:1316
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Settings\OnlineSpeechPrivacy" /v "HasAccepted" /t REG_DWORD /d 00000000 /f3⤵PID:4608
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack" /v "ShowedToastAtLevel" /t REG_DWORD /d 00000001 /f3⤵
- System Location Discovery: System Language Discovery
PID:412
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\DataCollection" /v "AllowTelemetry" /t REG_DWORD /d 00000000 /f3⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Privacy" /v "TailoredExperiencesWithDiagnosticDataEnabled" /t REG_DWORD /d 00000000 /f3⤵PID:1860
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\EventTranscriptKey" /v "EnableEventTranscript" /t REG_DWORD /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Siuf\Rules" /v "NumberOfSIUFInPeriod" /t REG_DWORD /d 00000000 /f3⤵PID:4728
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Siuf\Rules" /v "PeriodInNanoSeconds" /t REG_SZ /d "-" /f3⤵PID:5060
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System" /v "PublishUserActivities" /t REG_DWORD /d 00000000 /f3⤵PID:1208
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System" /v "UploadUserActivities" /t REG_DWORD /d 00000000 /f3⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userNotificationListener" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:4604
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications" /v "ToastEnabled" /t REG_DWORD /d "0" /f3⤵PID:3452
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v "NOC_GLOBAL_SETTING_ALLOW_NOTIFICATION_SOUND" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings" /v "NOC_GLOBAL_SETTING_ALLOW_CRITICAL_TOASTS_ABOVE_LOCK" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\QuietHours" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:4492
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\windows.immersivecontrolpanel_cw5n1h2txyewy!microsoft.windows.immersivecontrolpanel" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:1392
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.AutoPlay" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:5052
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.LowDisk" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:3856
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.Print.Notification" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:2520
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:4528
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.WiFiNetworkManager" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:1460
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Policies\Microsoft\Windows\Explorer" /v "DisableNotificationCenter" /t REG_DWORD /d "1" /f3⤵PID:2188
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Maintenance" /v "MaintenanceDisabled" /t REG_DWORD /d "1" /f3⤵PID:4188
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Accessibility" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:3984
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\AppSync" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:2340
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\BrowserSettings" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:3296
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Credentials" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:4432
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\DesktopTheme" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:4440
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Language" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:3012
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\PackageState" /v "Enabled" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Personalization" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:1356
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\StartLayout" /v "Enabled" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\SettingSync\Groups\Windows" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\GameBar" /v "AllowAutoGameMode" /t REG_DWORD /d 00000001 /f3⤵PID:4192
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\GameBar" /v "AutoGameModeEnabled" /t REG_DWORD /d 00000001 /f3⤵PID:4796
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\GraphicsDrivers" /v "HwSchMode" /t REG_DWORD /d 00000002 /f3⤵PID:1724
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX\UserGpuPreferences" /v "DirectXUserGlobalSettings" /t REG_SZ /d "VRROptimizeEnable=0;" /f3⤵PID:1176
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\PriorityControl" /v "Win32PrioritySeparation" /t REG_DWORD /d "38" /f3⤵PID:3440
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\SYSTEM\CurrentControlSet\Control\Power\PowerThrottling" /v "PowerThrottlingOff" /t REG_DWORD /d "1" /f3⤵PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:3060
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\Windows Search" /v "ConnectedSearchUseWeb" /t REG_DWORD /d "0" /f3⤵PID:5104
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Policies\Microsoft\Windows\Windows Search" /v "DisableWebSearch" /t REG_DWORD /d "1" /f3⤵PID:404
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Search" /v "BingSearchEnabled" /t REG_DWORD /d "0" /f3⤵PID:644
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize" /v "EnableTransparency" /t REG_DWORD /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Accessibility\MouseKeys" /v "Flags" /t REG_SZ /d "0" /f3⤵PID:4160
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d "0" /f3⤵PID:3176
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Accessibility\Keyboard Response" /v "Flags" /t REG_SZ /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Accessibility\ToggleKeys" /v "Flags" /t REG_SZ /d "0" /f3⤵PID:396
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Search" /v "BackgroundAppGlobalToggle" /t REG_DWORD /d 00000000 /f3⤵PID:5024
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\activity" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appDiagnostics" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:2400
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\appointments" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\bluetoothSync" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\broadFileSystemAccess" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3616
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3132
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\cellularData\Microsoft.Win32WebViewHost_cw5n1h2txyewy" /v "Value" /t REG_SZ /d "Allow" /f3⤵PID:3536
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\chat" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:528
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\contacts" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3092
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\documentsLibrary" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:4760
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\email" /v "Value" /t REG_SZ /d "Deny" /f3⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\gazeInput" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:832
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3140
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\location\Microsoft.Win32WebViewHost_cw5n1h2txyewy" /v "Value" /t REG_SZ /d "Prompt" /f3⤵
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCall" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\phoneCallHistory" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3096
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\picturesLibrary" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3688
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\radios" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:5068
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:4792
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userAccountInformation\Microsoft.AccountsControl_cw5n1h2txyewy" /v "Value" /t REG_SZ /d "Prompt" /f3⤵PID:32
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userDataTasks" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3532
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userNotificationListener" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:5012
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\videosLibrary" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:3888
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam" /v "Value" /t REG_SZ /d "Allow" /f3⤵PID:4604
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\webcam\Microsoft.Win32WebViewHost_cw5n1h2txyewy" /v "Value" /t REG_SZ /d "Allow" /f3⤵PID:2724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator"3⤵PID:4248
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /disable3⤵PID:2000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM"3⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Customer Experience Improvement Program\BthSQM" /disable3⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask"3⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Customer Experience Improvement Program\KernelCeipTask" /disable3⤵PID:3796
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip"3⤵PID:2440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Customer Experience Improvement Program\UsbCeip" /disable3⤵PID:2136
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Customer Experience Improvement Program\Uploader"3⤵PID:2520
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Customer Experience Improvement Program\Uploader" /disable3⤵PID:4528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser"3⤵PID:4812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /disable3⤵PID:908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Application Experience\ProgramDataUpdater"3⤵PID:1092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Application Experience\ProgramDataUpdater" /disable3⤵PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Application Experience\StartupAppTask"3⤵PID:348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Shell\FamilySafetyMonitor"3⤵PID:3960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Shell\FamilySafetyMonitor" /disable3⤵PID:1652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Shell\FamilySafetyRefresh"3⤵PID:2708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Shell\FamilySafetyRefresh" /disable3⤵PID:432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Shell\FamilySafetyUpload"3⤵PID:2088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /change /tn "\Microsoft\Windows\Shell\FamilySafetyUpload" /disable3⤵PID:2764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /end /tn "\Microsoft\Windows\Maintenance\WinSAT"3⤵PID:2288
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Feeds" /v "EnableFeeds" /t REG_DWORD /d "0" /f3⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft" /v "AllowNewsAndInterests" /t REG_DWORD /d "0" /f3⤵PID:2568
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableActivityFeed" /t REG_DWORD /d "0" /f3⤵PID:4252
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKCU\Control Panel\International\User Profile" /v "HttpAcceptLanguageOptOut" /t REG_DWORD /d "1" /f3⤵PID:3424
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v "Enabled" /t REG_DWORD /d "0" /f3⤵PID:4916
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\Software\Policies\Microsoft\Windows\System" /v "EnableActivityFeed" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "DisallowShaking" /t REG_DWORD /d "1" /f3⤵PID:4032
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "EnableBalloonTips" /t REG_DWORD /d "0" /f3⤵PID:3260
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "ShowSyncProviderNotifications" /t REG_DWORD /d "0" /f3⤵PID:700
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\CapabilityAccessManager\ConsentStore\userNotificationListener" /v "Value" /t REG_SZ /d "Deny" /f3⤵PID:2944
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\Software\Policies\Microsoft\Windows\AdvertisingInfo" /v "DisabledByGroupPolicy" /t REG_DWORD /d "1" /f3⤵PID:740
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\System" /v "AllowExperimentation" /t REG_DWORD /d "0" /f3⤵PID:3372
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\PolicyManager\default\System\AllowExperimentation" /v "value" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications" /v "GlobalUserDisabled" /t REG_DWORD /d 00000001 /f3⤵PID:4536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:4228
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-AppxPackage -Name Microsoft.549981C3F5F103⤵PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:3628
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "4" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:5076
-
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csrss.exe\PerfOptions" /v "IoPriority" /t REG_DWORD /d "3" /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:4248
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵PID:348
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:2560
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc3⤵
- Launches sc.exe
PID:2936
-
-
C:\Windows\SysWOW64\sc.exesc config DoSvc start= disabled3⤵
- Launches sc.exe
PID:3476
-
-
C:\Windows\SysWOW64\sc.exesc stop diagsvc3⤵
- Launches sc.exe
PID:2040
-
-
C:\Windows\SysWOW64\sc.exesc config diagsvc start= disabled3⤵
- Launches sc.exe
PID:3988
-
-
C:\Windows\SysWOW64\sc.exesc stop DPS3⤵
- Launches sc.exe
PID:4916
-
-
C:\Windows\SysWOW64\sc.exesc config DPS start= disabled3⤵
- Launches sc.exe
PID:2808
-
-
C:\Windows\SysWOW64\sc.exesc stop dmwappushservice3⤵
- Launches sc.exe
PID:4856
-
-
C:\Windows\SysWOW64\sc.exesc config dmwappushservice start= disabled3⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\SysWOW64\sc.exesc stop MapsBroker3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\sc.exesc config MapsBroker start= disabled3⤵
- Launches sc.exe
PID:700
-
-
C:\Windows\SysWOW64\sc.exesc stop lfsvc3⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\SysWOW64\sc.exesc config lfsvc start= disabled3⤵
- Launches sc.exe
PID:4796
-
-
C:\Windows\SysWOW64\sc.exesc stop CscService3⤵
- Launches sc.exe
PID:2860
-
-
C:\Windows\SysWOW64\sc.exesc config CscService start= disabled3⤵
- Launches sc.exe
PID:3320
-
-
C:\Windows\SysWOW64\sc.exesc stop SEMgrSvc3⤵
- Launches sc.exe
PID:1032
-
-
C:\Windows\SysWOW64\sc.exesc config SEMgrSvc start= disabled3⤵
- Launches sc.exe
PID:4536
-
-
C:\Windows\SysWOW64\sc.exesc stop PhoneSvc3⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\SysWOW64\sc.exesc config PhoneSvc start= disabled3⤵
- Launches sc.exe
PID:3552
-
-
C:\Windows\SysWOW64\sc.exesc stop RemoteRegistry3⤵
- Launches sc.exe
PID:4276
-
-
C:\Windows\SysWOW64\sc.exesc config RemoteRegistry start= disabled3⤵
- Launches sc.exe
PID:1156
-
-
C:\Windows\SysWOW64\sc.exesc stop RetailDemo3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\sc.exesc config RetailDemo start= disabled3⤵
- Launches sc.exe
PID:4688
-
-
C:\Windows\SysWOW64\sc.exesc stop SysMain3⤵
- Launches sc.exe
PID:180
-
-
C:\Windows\SysWOW64\sc.exesc config SysMain start= disabled3⤵
- Launches sc.exe
PID:2540
-
-
C:\Windows\SysWOW64\sc.exesc stop WalletService3⤵
- Launches sc.exe
PID:2924
-
-
C:\Windows\SysWOW64\sc.exesc config WalletService start= disabled3⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\SysWOW64\sc.exesc stop WSearch3⤵
- Launches sc.exe
PID:516
-
-
C:\Windows\SysWOW64\sc.exesc config WSearch start= disabled3⤵
- Launches sc.exe
PID:968
-
-
C:\Windows\SysWOW64\sc.exesc stop W32Time3⤵
- Launches sc.exe
PID:3664
-
-
C:\Windows\SysWOW64\sc.exesc config W32Time start= disabled3⤵
- Launches sc.exe
PID:4184
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MessagingService" /v Start /t REG_DWORD /d 00000004 /f3⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WpnUserService" /v Start /t REG_DWORD /d 00000004 /f3⤵
- System Location Discovery: System Language Discovery
PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:4444
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "SystemResponsiveness" /t REG_DWORD /d 0 /f3⤵PID:3992
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "NetworkThrottlingIndex" /t REG_DWORD /d ffffffff /f3⤵PID:3556
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "NoLazyMode" /t REG_DWORD /d 1 /f3⤵
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile" /v "AlwaysOn" /t REG_DWORD /d 1 /f3⤵PID:1600
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "Affinity" /t REG_DWORD /d 7 /f3⤵PID:1832
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "Background Only" /t REG_SZ /d "True" /f3⤵PID:2184
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "Clock Rate" /t REG_DWORD /d 10000 /f3⤵PID:3848
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "GPU Priority" /t REG_DWORD /d 8 /f3⤵PID:1136
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "Priority" /t REG_DWORD /d 6 /f3⤵PID:1596
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "Scheduling Category" /t REG_SZ /d "Medium" /f3⤵PID:4660
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Audio" /v "SFIO Priority" /t REG_SZ /d "Normal" /f3⤵PID:4376
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "Affinity" /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "Background Only" /t REG_SZ /d "True" /f3⤵PID:1064
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "BackgroundPriority" /t REG_DWORD /d 24 /f3⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "Clock Rate" /t REG_DWORD /d 10000 /f3⤵PID:436
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "GPU Priority" /t REG_DWORD /d 18 /f3⤵PID:4364
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "Priority" /t REG_DWORD /d 8 /f3⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "Scheduling Category" /t REG_SZ /d "High" /f3⤵PID:3028
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "SFIO Priority" /t REG_SZ /d "High" /f3⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\DisplayPostProcessing" /v "Latency Sensitive" /t REG_SZ /d "True" /f3⤵PID:2220
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Affinity" /t REG_DWORD /d 0 /f3⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Background Only" /t REG_SZ /d "False" /f3⤵PID:3116
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Clock Rate" /t REG_DWORD /d 10000 /f3⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "GPU Priority" /t REG_DWORD /d 18 /f3⤵PID:4036
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Priority" /t REG_DWORD /d 6 /f3⤵
- System Location Discovery: System Language Discovery
PID:2464
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Scheduling Category" /t REG_SZ /d "High" /f3⤵PID:2692
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "SFIO Priority" /t REG_SZ /d "High" /f3⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Multimedia\SystemProfile\Tasks\Games" /v "Latency Sensitive" /t REG_SZ /d "True" /f3⤵PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:1180
-
C:\Windows\SysWOW64\reg.exeReg.exe add "HKCU\Control Panel\Desktop" /v "JPEGImportQuality" /t REG_DWORD /d "100" /f3⤵PID:4600
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:3016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/FNClips/ToX-Utility/raw/main/MicrosoftEdgeSetup.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeSetup.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeSetup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeSetup.exe" /silent /install3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Program Files (x86)\Microsoft\Temp\EU371F.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU371F.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=prefers&lang=en&brand=M100"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3936 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1112
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3660 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:924
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:832
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1148
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUY1REMwQjMtMDlFOS00RDZELUFFNDEtMjY1MUU0MzBFQjlGfSIgdXNlcmlkPSJ7NEI1NDA0MTAtMEQwNC00NDE5LTkzRTAtQTRERUJGQUE0RUYxfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins4QzM5MUExQi0zNzk5LTQ0NkYtQTUyQi01RUYxMjNCM0ZBMjN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjE1IiBsYW5nPSJlbiIgYnJhbmQ9Ik0xMDAiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2NTAyNDA4NjIzIiBpbnN0YWxsX3RpbWVfbXM9IjU5OSIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of SetWindowsHookEx
PID:3688
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}&appname=Microsoft%20Edge&needsadmin=prefers&lang=en&brand=M100" /installsource otherinstallcmd /sessionid "{AF5DC0B3-09E9-4D6D-AE41-2651E430EB9F}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:408
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic os get TotalVisibleMemorySize /value3⤵PID:1424
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get TotalVisibleMemorySize /value4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control" /v "SvcHostSplitThresholdInKB" /t REG_DWORD /d 5217772 /f3⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:2896
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "ClearPageFileAtShutdown" /t REG_DWORD /d 00000000 /f3⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "DisablePagingExecutive" /t REG_DWORD /d 00000001 /f3⤵PID:2320
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "LargeSystemCache" /t REG_DWORD /d 00000000 /f3⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "NonPagedPoolQuota" /t REG_DWORD /d 00000000 /f3⤵PID:1124
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "NonPagedPoolSize" /t REG_DWORD /d 00000000 /f3⤵PID:872
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "PagedPoolQuota" /t REG_DWORD /d 00000000 /f3⤵PID:1876
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "PagedPoolSize" /t REG_DWORD /d 000000c0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "SecondLevelDataCache" /t REG_DWORD /d 00000400 /f3⤵PID:452
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "SessionPoolSize" /t REG_DWORD /d 000000c0 /f3⤵PID:2132
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "SessionViewSize" /t REG_DWORD /d 000000c0 /f3⤵PID:3596
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "SystemPages" /t REG_DWORD /d ffffffff /f3⤵PID:1316
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "PhysicalAddressExtension" /t REG_DWORD /d 00000001 /f3⤵PID:2980
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettings" /t REG_DWORD /d 00000001 /f3⤵PID:4600
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettingsOverride" /t REG_DWORD /d 00000003 /f3⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "FeatureSettingsOverrideMask" /t REG_DWORD /d 00000003 /f3⤵PID:644
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "IoPageLockLimit" /t REG_DWORD /d 00fefc00 /f3⤵PID:4228
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v "PoolUsageMaximum" /t REG_DWORD /d 00000060 /f3⤵PID:4244
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters" /v "EnablePrefetcher" /t REG_DWORD /d 00000003 /f3⤵PID:4472
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters" /v "EnableSuperfetch" /t REG_DWORD /d 00000003 /f3⤵PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_USBController get PNPDeviceID3⤵PID:1900
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_USBController get PNPDeviceID4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Enum\PNPDeviceID\Device Parameters\Interrupt Management\Affinity Policy" /v "DevicePriority" /f3⤵PID:372
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Enum\PNPDeviceID\Device Parameters\Interrupt Management\MessageSignaledInterruptProperties" /v "MSISupported" /t REG_DWORD /d "1" /f3⤵PID:3472
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters\Interrupt Management\Affinity Policy" /v "DevicePriority" /f3⤵PID:4056
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters\Interrupt Management\MessageSignaledInterruptProperties" /v "MSISupported" /t REG_DWORD /d "1" /f3⤵PID:3860
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Enum\ \Device Parameters\Interrupt Management\Affinity Policy" /v "DevicePriority" /f3⤵PID:1780
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Enum\ \Device Parameters\Interrupt Management\MessageSignaledInterruptProperties" /v "MSISupported" /t REG_DWORD /d "1" /f3⤵PID:1176
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_USBController get PNPDeviceID| findstr /l "PCI\VEN_"3⤵PID:3676
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_USBController get PNPDeviceID4⤵PID:4668
-
-
C:\Windows\SysWOW64\findstr.exefindstr /l "PCI\VEN_"4⤵PID:908
-
-
-
C:\Windows\SysWOW64\reg.exereg add !REG_PATH! /v SelectiveSuspendOn /t REG_DWORD /d 0 /f3⤵PID:1876
-
-
C:\Windows\SysWOW64\reg.exereg add !REG_PATH! /v SelectiveSuspendEnabled /t REG_BINARY /d 00 /f3⤵PID:4996
-
-
C:\Windows\SysWOW64\reg.exereg add !REG_PATH! /v EnhancedPowerManagementEnabled /t REG_DWORD /d 0 /f3⤵PID:452
-
-
C:\Windows\SysWOW64\reg.exereg add !REG_PATH! /v AllowIdleIrpInD3 /t REG_DWORD /d 0 /f3⤵PID:2132
-
-
C:\Windows\SysWOW64\reg.exereg add !REG_PATH!\WDF /v IdleInWorkingState /t REG_DWORD /d 0 /f3⤵PID:3596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic path Win32_USBController get PNPDeviceID| findstr /l "PCI\VEN_"3⤵PID:1316
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_USBController get PNPDeviceID4⤵PID:2980
-
-
C:\Windows\SysWOW64\findstr.exefindstr /l "PCI\VEN_"4⤵PID:4544
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters\Interrupt Management\MessageSignaledInterruptProperties" /v "MSISupported" /t REG_DWORD /d "1" /f3⤵PID:64
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters\Interrupt Management\Affinity Policy" /v "DevicePriority" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4716
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "AllowIdleIrpInD3" /t REG_DWORD /d "0" /f3⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "D3ColdSupported" /t REG_DWORD /d "0" /f3⤵PID:1640
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "DeviceSelectiveSuspended" /t REG_DWORD /d "0" /f3⤵PID:2944
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "EnableSelectiveSuspend" /t REG_DWORD /d "0" /f3⤵PID:2648
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "EnhancedPowerManagementEnabled" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "SelectiveSuspendEnabled" /t REG_DWORD /d "0" /f3⤵PID:2740
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "SelectiveSuspendOn" /t REG_DWORD /d "0" /f3⤵PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnhancedPowerManagementEnabled" | findstr "HKEY"3⤵PID:3408
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnhancedPowerManagementEnabled"4⤵
- Checks SCSI registry key(s)
PID:3796
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:3260
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "EnhancedPowerManagementEnabled" /t REG_DWORD /d "0" /f3⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_0627&PID_0001\28754-0000:00:04.0-1\Device Parameters" /v "EnhancedPowerManagementEnabled" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "AllowIdleIrpInD3" | findstr "HKEY"3⤵PID:1376
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "AllowIdleIrpInD3"4⤵
- Checks SCSI registry key(s)
PID:3684
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:372
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "AllowIdleIrpInD3" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_0627&PID_0001\28754-0000:00:04.0-1\Device Parameters" /v "AllowIdleIrpInD3" /t REG_DWORD /d "0" /f3⤵PID:5060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnableSelectiveSuspend" | findstr "HKEY"3⤵PID:4256
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnableSelectiveSuspend"4⤵
- Checks SCSI registry key(s)
PID:4168
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:2860
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "EnableSelectiveSuspend" /t REG_DWORD /d "0" /f3⤵PID:3648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "DeviceSelectiveSuspended" | findstr "HKEY"3⤵PID:2560
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "DeviceSelectiveSuspended"4⤵
- Checks SCSI registry key(s)
PID:5104
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "DeviceSelectiveSuspended" /t REG_DWORD /d "0" /f3⤵PID:1512
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_0627&PID_0001\28754-0000:00:04.0-1\Device Parameters" /v "DeviceSelectiveSuspended" /t REG_DWORD /d "0" /f3⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "SelectiveSuspendEnabled" | findstr "HKEY"3⤵PID:3208
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "SelectiveSuspendEnabled"4⤵
- Checks SCSI registry key(s)
PID:2380
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:3096
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "SelectiveSuspendEnabled" /t REG_DWORD /d "0" /f3⤵PID:2804
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_0627&PID_0001\28754-0000:00:04.0-1\Device Parameters" /v "SelectiveSuspendEnabled" /t REG_DWORD /d "0" /f3⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "SelectiveSuspendOn" | findstr "HKEY"3⤵PID:1600
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "SelectiveSuspendOn"4⤵
- Checks SCSI registry key(s)
PID:4600
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:2980
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "SelectiveSuspendOn" /t REG_DWORD /d "0" /f3⤵PID:1316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnumerationRetryCount" | findstr "HKEY"3⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnumerationRetryCount"4⤵
- Checks SCSI registry key(s)
PID:3068
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_0627&PID_0001\28754-0000:00:04.0-1\Device Parameters" /v "EnumerationRetryCount" /t REG_DWORD /d "0" /f3⤵PID:924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "ExtPropDescSemaphore" | findstr "HKEY"3⤵PID:1640
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "ExtPropDescSemaphore"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2944
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:228
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_0627&PID_0001\28754-0000:00:04.0-1\Device Parameters" /v "ExtPropDescSemaphore" /t REG_DWORD /d "0" /f3⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "WaitWakeEnabled" | findstr "HKEY"3⤵PID:2740
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "WaitWakeEnabled"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:3624
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "D3ColdSupported" | findstr "HKEY"3⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "D3ColdSupported"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4972
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:736
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_24CD&SUBSYS_11001AF4&REV_10\3&11583659&0&20\Device Parameters" /v "D3ColdSupported" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "WdfDirectedPowerTransitionEnable" | findstr "HKEY"3⤵PID:3472
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "WdfDirectedPowerTransitionEnable"4⤵
- Checks SCSI registry key(s)
PID:3684
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:3544
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_2668&SUBSYS_11001AF4&REV_01\3&11583659&0&28\Device Parameters\WDF" /v "WdfDirectedPowerTransitionEnable" /t REG_DWORD /d "0" /f3⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnableIdlePowerManagement" | findstr "HKEY"3⤵PID:1536
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "EnableIdlePowerManagement"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:1176
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:5116
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_2922&SUBSYS_11001AF4&REV_02\3&11583659&0&10\Device Parameters\StorPort" /v "EnableIdlePowerManagement" /t REG_DWORD /d "0" /f3⤵PID:2860
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_2922&SUBSYS_11001AF4&REV_02\3&11583659&0&FA\Device Parameters\StorPort" /v "EnableIdlePowerManagement" /t REG_DWORD /d "0" /f3⤵PID:3552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "IdleInWorkingState" | findstr "HKEY"3⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "IdleInWorkingState"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2320
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵
- System Location Discovery: System Language Discovery
PID:4668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "IoLatencyCap" | findstr "HKEY"3⤵PID:3676
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "IoLatencyCap"4⤵
- Checks SCSI registry key(s)
PID:3368
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "Dmaecho" | findstr "HKEY"3⤵PID:384
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "Dmaecho"4⤵
- Checks SCSI registry key(s)
PID:2132
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:4996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "!S_MAGENTA!appingCompatible" | findstr "HKEY"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:908 -
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "!S_MAGENTA!appingCompatible"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Checks SCSI registry key(s)
PID:1548
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵
- System Location Discovery: System Language Discovery
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "Dmaecho" | findstr "HKEY"3⤵PID:2116
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "Dmaecho"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:556
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "!S_MAGENTA!appingCompatibleSelfhost" | findstr "HKEY"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3068 -
C:\Windows\SysWOW64\reg.exereg query "HKLM\SYSTEM\CurrentControlSet\Enum" /s /f "!S_MAGENTA!appingCompatibleSelfhost"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Checks SCSI registry key(s)
PID:3740
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:4884
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:3624
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell Disable-NetAdapterLso -Name "*"3⤵PID:4972
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "ForEach($adapter In Get-NetAdapter){Disable-NetAdapterPowerManagement -Name $adapter.Name -ErrorAction SilentlyContinue}"3⤵
- Hide Artifacts: Ignore Process Interrupts
PID:4372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "ForEach($adapter In Get-NetAdapter){Disable-NetAdapterLso -Name $adapter.Name -ErrorAction SilentlyContinue}"3⤵
- Hide Artifacts: Ignore Process Interrupts
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOWERSHELL Disable-NetAdapterPowerManagement -Name "*" -ErrorAction SilentlyContinue3⤵
- Hide Artifacts: Ignore Process Interrupts
PID:2860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}" /v "*SpeedDuplex" /s | findstr "HKEY"3⤵PID:2552
-
C:\Windows\SysWOW64\reg.exeReg query "HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318}" /v "*SpeedDuplex" /s4⤵PID:4700
-
-
C:\Windows\SysWOW64\findstr.exefindstr "HKEY"4⤵PID:2980
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵PID:2648
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f3⤵
- UAC bypass
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *Bing* | Remove-AppxPackage"2⤵PID:1656
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *Bing* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *XboxApp* | Remove-AppxPackage"2⤵PID:1424
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *XboxApp* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *YourPhone* | Remove-AppxPackage"2⤵PID:1712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *YourPhone* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *Alarms* | Remove-AppxPackage"2⤵PID:2512
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *Alarms* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *3DViewer* | Remove-AppxPackage"2⤵PID:3284
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *3DViewer* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *Maps* | Remove-AppxPackage"2⤵PID:2944
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *Maps* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *3DBuilder* | Remove-AppxPackage"2⤵PID:5104
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *3DBuilder* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *SoundRecorder* | Remove-AppxPackage"2⤵PID:4992
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *SoundRecorder* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1436
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *MicrosoftEdge* | Remove-AppxPackage"2⤵PID:1952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *MicrosoftEdge* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c powershell -Command "Get-AppxPackage -AllUsers *Camera* | Remove-AppxPackage"2⤵PID:2296
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers *Camera* | Remove-AppxPackage"3⤵
- Command and Scripting Interpreter: PowerShell
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ipconfig /flushdns2⤵PID:4284
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c rd /s /q C:\\$Recycle.Bin2⤵PID:4612
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1780
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2932 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzNyIgaW5zdGFsbGRhdGV0aW1lPSIxNzI4MjkyODgxIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNzI3NjU0NjA4MjY2MjM0Ij48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDMyNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iNjUwNjMxNTQzNSIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Network Configuration Discovery: Internet Connection Discovery
PID:1664
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\MicrosoftEdge_X64_130.0.2849.80.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4916 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\MicrosoftEdge_X64_130.0.2849.80.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- System policy modification
PID:708 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x21c,0x220,0x224,0x1d8,0x228,0x7ff7f1a2d730,0x7ff7f1a2d73c,0x7ff7f1a2d7484⤵
- Executes dropped EXE
PID:2936
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Checks computer location settings
- Executes dropped EXE
PID:1916 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E325FBDB-8078-41AE-83A6-457EADEB0FE0}\EDGEMITMP_50617.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff7f1a2d730,0x7ff7f1a2d73c,0x7ff7f1a2d7485⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff7bf67d730,0x7ff7bf67d73c,0x7ff7bf67d7485⤵
- Executes dropped EXE
PID:2400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level4⤵
- Executes dropped EXE
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x21c,0x220,0x224,0x1fc,0x228,0x7ff7bf67d730,0x7ff7bf67d73c,0x7ff7bf67d7485⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2788
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5024 -
C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=130.0.6723.117 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\130.0.2849.80\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=130.0.2849.80 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff7bf67d730,0x7ff7bf67d73c,0x7ff7bf67d7485⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2760
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QUY1REMwQjMtMDlFOS00RDZELUFFNDEtMjY1MUU0MzBFQjlGfSIgdXNlcmlkPSJ7NEI1NDA0MTAtMEQwNC00NDE5LTkzRTAtQTRERUJGQUE0RUYxfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InswM0M0RTFFOS0zNkJDLTQ5NzctOUNEMC1BRDFBQzM1ODJBNEN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7VlBRb1AxRitmcTE1d1J6aDFrUEw0UE1wV2g4T1JNQjVpenZyT0MvY2hqUT0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7NTZFQjE4RjgtQjAwOC00Q0JELUI2RDItOEM5N0ZFN0U5MDYyfSIgdmVyc2lvbj0iIiBuZXh0dmVyc2lvbj0iMTMwLjAuMjg0OS44MCIgbGFuZz0iZW4iIGJyYW5kPSJNMTAwIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM3Mjc2ODcyNjgyODEzNDAiPjx1cGRhdGVjaGVjay8-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_UDE9MTczMjEwOTExMCZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1YV1NUdFRmJTJiN1JKc2xDZHpIall2RGlETlNrNTdWNyUyZkVYMnpOVmd1cVl0Rk4wMFFCek91ZDVxUXR4djdSSkkxYnpMaFJnQlp3aHVTN2FIUXNIeTRkekElM2QlM2QiIHNlcnZlcl9pcF9oaW50PSIiIGNkbl9jaWQ9Ii0xIiBjZG5fY2NjPSIiIGNkbl9tc2VkZ2VfcmVmPSIiIGNkbl9henVyZV9yZWZfb3JpZ2luX3NoaWVsZD0iIiBjZG5fY2FjaGU9IiIgY2RuX3AzcD0iIiBkb3dubG9hZGVkPSIxNzUwNzY5MjAiIHRvdGFsPSIxNzUwNzY5MjAiIGRvd25sb2FkX3RpbWVfbXM9IjEyNjkzIi8-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1688
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k AppReadiness -p -s AppReadiness1⤵PID:624
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Advertising.Xaml_8wekyb3d8bbwe1⤵PID:3648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2980
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.BingWeather_8wekyb3d8bbwe1⤵PID:1436
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Microsoft3DViewer_8wekyb3d8bbwe1⤵PID:4760
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe1⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.5MB
MD5b621cf9d3506d2cd18dc516d9570cd9c
SHA1f90ed12727015e78f07692cbcd9e3c0999a03c3a
SHA25664050839b4a6f27d896e1194e902a2f7a3c1cab0ef864b558ab77f1be25145d6
SHA512167c73cf457689f8ba031015c1e411545550f602919c35aff6fd4d602bd591d34e8c12887a946902b798bf4cf98aadfce3c2de810bf16c7c24a216bfd8abec19
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5b69894fc1c3f26c77b1826ef8b5a9fc5
SHA1cff7b4299253beda53fb015408dd840db59901a1
SHA256b91bad4c618eb6049b19364f62827470095e30519d07f4e0f2ccc387ddd5f1bf
SHA5128361e97d84082f8e888262d0657bac47c152bd72f972628f446f58cbeacf37c05f484dce3fb0d38c4f0da2a2dcbb0813639d201d127ec7f072b942d43b216755
-
Filesize
201KB
MD5136e8226d68856da40a4f60e70581b72
SHA16c1a09e12e3e07740feef7b209f673b06542ab62
SHA256b4b8a2f87ee9c5f731189fe9f622cb9cd18fa3d55b0e8e0ae3c3a44a0833709f
SHA5129a0215830e3f3a97e8b2cdcf1b98053ce266f0c6cb537942aec1f40e22627b60cb5bb499faece768481c41f7d851fcd5e10baa9534df25c419664407c6e5a399
-
Filesize
215KB
MD5205590d4fb4b1914d2853ab7a9839ccf
SHA1d9bbf8941df5993f72ffcf46beefcfcd88694ebd
SHA2565f82471d58b6e700248d9602ce4a0a5cda4d2e2863ef1eb9fee4effcc07f3767
SHA512bce1447d5d3210c22d52dec3b846db091b65ed03fd9d7cd11c6c4dbd2aa5a943d881360bc033c29abd61011581ff9354b35cbe421719d92568ed99997bfbbae8
-
Filesize
261KB
MD5b07ab49ee8453853021c7dac2b2131db
SHA1e1d87d6a6e7503d0d2b288ea5f034fe2f346196a
SHA256f8535d5d73ebebed15adc6ae2ced6bb4889aa23e6ffe55faeabd961bf77b05e4
SHA5125eaae533fbe71430ae2a717f7668fd0a26ec37624e198a32f09bfdbee7e3b6e93d64e4fbb78cbdb05c4fe390a864490ea997d11849ecd371f5153bc8bfafccc3
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD55d89123f9b96098d8fad74108bdd5f7e
SHA16309551b9656527563d2b2f3c335fd6805da0501
SHA25603c3c918886e58f096aa8e919b1e9f8dcd5a9f2a4765971049bf8da305476f44
SHA5129d8190e5374cd1b4adbbfb87c27fa40d4de529d7c0a20654e0ce189a4cb9a53d3708c4ce657a7a5469b015df7efbbff495fc844579d9cd363b329b7e007e85c8
-
Filesize
29KB
MD54f860d5995ab77e6efa8f589a758c6d2
SHA107536839ccfd3c654ec5dc2161020f729973196d
SHA2569841d787142dd54fea6b033bd897f05f3e617b48b051de0ee3cf5865b3393150
SHA5120b9a661b76360f1fb2eb3ee25c6bf2cbab7ec74e2363e0af321dc4d0afb3cad301dddd16ea367d588451a40a2c2ed41f21d7afae48307e1e4a4ec5b24165b378
-
Filesize
24KB
MD5f624de37750fd191eb29d4de36818f8b
SHA1b647dae9b9a3c673980afa651d73ce0a4985aae6
SHA256e284453cd512e446fcbf9440013f8cb2348ffd6b1acec5366f2511cdf88b1794
SHA512d1d65e29ed59e34d4ff66df11a2368f1a724730e32eb245022d4f3d1fadf16d445ba8532460afb0e6e91f8be60a7240d13577403193042d1e912a67e4bf23b1a
-
Filesize
26KB
MD55de3f4dabb5f033f24e29033142e7349
SHA15c446985de443501b545d75f6886a143c748b033
SHA2562533d443b68c5288468b0b20cc3a70dc05f0498369d5321368a97dd5bf3268c8
SHA512c96296e6f67edeff2be5dc03014a8eb65fc287fb899357d4608c36c07b4610827aa18cbec6ccd47b66230a12341af488aca8bd02632fa768f84ca7b1d9c9d065
-
Filesize
29KB
MD51fb14c6c4fee7bfabe41badb7c5acff8
SHA1953d94cd73951943db14c08cce37b2d3ac821b02
SHA256cd32339fd7e4a5959e93eb5bfd6e009e4137e15c5e6c2e861d7891487216da49
SHA512a93b081935fbe48fafa8071a9cd593ae7b19205c70eaf48c724397019a04161460c66d6d8c6ffd872f4d52a4a7aa25ba1cba04181b9ebaca04b76d111ea588d2
-
Filesize
29KB
MD5d3345579310f3bd080b406de47b2305f
SHA116aefb27ea6d81c684f041aa50ebb49fdd403d83
SHA256b4ea3c63fa0104093a2b2034f950428e66d2cf3d55f0fc5bd688483392d60d69
SHA51265e4aa8587bc579b5109d91e02745f6de96a23b6ac2962cdeb6d9d536b51abab12b2bbaeca72572c3ae1971dac5bd24430eb2ae5ccf44a7068427594e4afdd7a
-
Filesize
29KB
MD5ecf3405e9e712d685ef1e8a5377296ea
SHA19872cdf450adf4257d77282a39b75822ce1c8375
SHA256e400415638a7b7dcc28b14a257a28e93e423c396e89a02cba51623fdfbdc6b0b
SHA51237e5f1b3bdd97a4370718dc2a46d78ab5b66865d3cdb66a20a7dc20a9d423ccde954c08f97e574fbab24e8dfa905351cbfb94bd3e6692a9b6526097ea3dc911d
-
Filesize
29KB
MD5051c429fa2beec9c2842c403a86c0e7b
SHA10a06a45200a1f5c81c48fbd2d03549fc9fac3a58
SHA2561a8465922bbb05a97a24f6c2200fcc7afd8bd0ace245c2eda9d9d335d4fb9353
SHA512bb59b41804328f27ba8861af32824266ca69ddcfdaaa11551b1edd4e129dbba630da8070abedb28e180045f8d0ddc1209cd901919f6b9aa421c457188af795c6
-
Filesize
29KB
MD582711e45d2b0764997abc1e0678a73bb
SHA147908e8885c86477a6f52eea5fddb005ec5b3fa3
SHA2562bb7455999b8f53a2a0834588ca4da4703f4da362a127d01cc6bd60ca0303799
SHA5124b517796edc954ab7f5a26a5d6605925dc7e84b611bcf59352b3b95f719cedc72c77a465fb1e7bc2d2f422d596c97968dac5b57292c82967d5cfaff980128fc2
-
Filesize
28KB
MD5a0a1f791984f1de2f03a36171232d18d
SHA171f69d8fe47640ba9705725d7d627a05519c8016
SHA256d2c7da8f4745b81874a9666c7d10a779a9956b4de0ebdaa1647bf78d4e17d85a
SHA512a4267911846cd55eb91227b0117ccbfdf8ef6c4ed0b8935b08e5d41a91aeabd9259988c71da8606cfb2876c4d69df6ca5a246687440283f1625105624305eb33
-
Filesize
30KB
MD5897712b508931dab76d39b209611740c
SHA19d80e07c2dc744e2efce3b67aa9876949fb9edfe
SHA256ee64fdefdb3381ce61fc445190cc44b015e7b65a3a16d28f3477f68de6079f1b
SHA5123329e37318dd9b11f282301e453af106168d3d10beff1ed62ffdcda60c6b4edb6b9c69ac6b9bb8abce3c9a9686a0152404524012dbff025e571de2cfcb3b5d56
-
Filesize
30KB
MD5e90155442b28008992a7d899ca730222
SHA11d448e9709de0d301ded6d75caaeba4348a4793d
SHA2566ae98b5e2eda22a0236434b7e952d732e3cd5d9cae2e51cd70222f1fd5278563
SHA512a91d8357ca976db2eb5a081077304a50edc1b55b2775c00cfde05e03831f98bd04e43f0dba5b3efd5a6370afcb10b23bbf307412467502e9ef57e0beae636013
-
Filesize
28KB
MD51de961b662a374c3af918c18225f4364
SHA1e8f1c438e57b322f43b4b851698bf38c129eb6ae
SHA256bb1365c5770dacbb918af27b47b02f269504f4d2396cf3f82bf5ecb2551c5021
SHA512c6bf62b684039f62744f1aab07f4751948e0c175f7fb7fe126f20903ce23fcdd2e284f1b794922621dae7eaa15c6dae0177ad102289a18f967721486f21073a1
-
Filesize
28KB
MD529f027d2d5fd486bdc20386ace925603
SHA166b8605f23871b4a8302bef0aaccb36ee1e72755
SHA25603c8566f749e8fa349d97101849bc3b2cc0b7561b565a2b0928bf8fe901da813
SHA5123348bdf10b2d964b34b791a774e28c97d3caf28d7f90e36b948cc2cb6c21e84cda933b7ddbd51c8fc604a450361cb834322c15ddbe0f4851154d05e5a2a2ea42
-
Filesize
28KB
MD5b0ae9aa0d5c17ee7abfc57d21cdcbae6
SHA101019eb6ba9c123be528136e12192b0bb33df407
SHA256d10938919e3d28d71e8e3ba2d8e02e0f9dc2faf148cdedc21c166fd994c603e2
SHA5124cba25c8159df865231b08fe650eedfb92d54c3037d28b2b9af010c8a59fa23669041a6c393622fe69b0194c2532f71f02b740f7e26e0bbf7ef34a421d6747b8
-
Filesize
30KB
MD5ad5b530eabff0540078c5d17f27b9610
SHA17e53dbbf64e70e561d37669e69f50eb0da8e37d1
SHA25649f512316a51e51027b4e70de4ffe8c8ecb188e126439a90a5d12d52a0393966
SHA512e1cc853d96589220676d39d91d4108633ce56304640f770e7d22b97a9b3be9452d5fb94e4e7fcd1400b62f0c398da8255c53a31853194a9e7b7784982b5ff40f
-
Filesize
30KB
MD5a7e64339a5314e3576c0d170171fa52a
SHA16c12aab6c97c30aff3245b78f7a3afeea604215e
SHA2564e9ccecb8e4383395f2134347fbad00521345ec9c857d8fa102d5257c7bea9bf
SHA512a4ca3fb60a7f4bda50847544dd1289d750f0d4b3565929290a8392b92822ef1856cec15a1f63f2c6fe1ef2e7cc0936a35bdb38ee5d904eb08cd32f05addc6ee4
-
Filesize
27KB
MD574d4cf3b8efb6cc3d0acc3eac38bd5b7
SHA19337803aadad9042c895b6f418b4c733b81221e0
SHA256b83c8981d8835e4c78250bf265faa6d64693204b77764c8e349abc4365ae9871
SHA512e6112ef60d56101aa16327042162d6ef43519bc56668ca8eaa7fd3e1aaadc75c7df75c1e41583a292ff1a9bdc7d9ad9f5c0d97fa84964532dca2d5f3df604c23
-
Filesize
27KB
MD519dc1f6d1f309eb7abf1e0c8257f41f8
SHA1e2d3e86fe22c6af6b8ee5b359315dfa6ac4d52ec
SHA256046f6c532fcabd969c6e63bb7ee0d7a83d806fa659006508e1c3a9485190d6ef
SHA512478d6a84452cfadc48547930e336ad459eec188dd3d9e4c778cded4ec3d34e00b2b8c0538366aa644ee67f878b29c5c73444c1406c66e8394761bb0979c6483c
-
Filesize
29KB
MD58f7f515d78d2df371993fd70f863ab8d
SHA1dfae1b47e80f91abf2d9c2aac009c0a1767bc59d
SHA256ba57fbb9d3a32b84d6a76054b9ad180b6510e53206b9804bb9ea18ff73c2ae3e
SHA512308a62af00a4410551eac967bb9f2cea7adf7c13b471dd28b276bda40b1e4c0b4ebb60aec29b6165069d40180bc45b4f5da5baddc374ce7bc5a5bb223afb4e96
-
Filesize
29KB
MD56af05d448c842027f876e93f8ac58b65
SHA1f34c988e3875a1d1b267b082476fcfb8d7505a73
SHA25636876b14a214cf98dda5100a7e7134d7ebb78e895535d6bd7562099574607867
SHA512412031db59de0367a102a026f73072244b33d726adc5bb9fd079db3dd37b5d6a24d7420a9811576d0a356933b5ba15cc9e2a92046d2d6e6d6fef37e9d840aec6
-
Filesize
28KB
MD5ae9bdf6416c3630c4b0b5b119308a135
SHA1d7218c677b098d2a93cc91ead39c83d3a2c653b6
SHA25662da90c9417a70632aa190fecc17c31ecf433c1f84f82b08d7d7290669cabf32
SHA5124333ac6cd3737f25e6e1d429b195da781ced4340b89808cbd5d5d2aae2e79bcc700419d613123d632252e31ac44d95b7718f23da5b82ab5054407e80106a64a7
-
Filesize
28KB
MD5fe73dbc305da6223d1e94e1cf548c000
SHA1b16f2c40d68cd9718eaaa9b6db9c8e5c4b6acb9e
SHA2561ef64088a613a4e10b4cf4206f95f5414ee27872798747234a6574b7e5c70a7d
SHA512d9900720d89defffa52198dbe63515995095c94aa0cbbe4f32a1c09d26809cec480e92926d2240702604b8c13fcdc0032cc46910ade8e4c1d2fc9a4bd1b63858
-
Filesize
28KB
MD5367ea715e942c81dd3cb734274969a0b
SHA1f92f1ec2a5be9b775e67c4252a07c37ed0ca508b
SHA256082da1c09782c026c9cd73456dc12539a226f0bf5d113e59bc93b29c1e98b37c
SHA512c94e787ba3bdb56d1827a0477461cbba6b7cc68986722275e0d04ea7dc70db83b5d03887eec810bf9b67f70b18bd3c7b7d28f0e554938b81d3501bc11f97830a
-
Filesize
28KB
MD55a30bc4216af48a493eeb0f3a9f02607
SHA12fdf65a4002d91818d56a23fb8bfd08ab715002f
SHA2565131c23915ad6b5b469bcbff31d0ae31ef34ded28ca0ffff9f1eb998bba98aa1
SHA51234b3a4865f31ebdb8665780011b384ada768a0f71bff77f91706b140eb8cc07fff8787f710cdb1ee14a449cae8f22ee5fddadcc501cf1c921eea078e97dc2f89
-
Filesize
29KB
MD584c4736cf301b93998028ed7678caec1
SHA13b6f1f6b9eb3dd7d9a13c11dfd3ac56c93f1b10f
SHA2563c8dcb7e982dac3159298009a86909b1e1000ccf6f4d333341f16d4d6fbd84ad
SHA5125a1b77ef9450c32802e94e473a5b4e43e892c923ef368ee9bbbbb5b0090429320263cc79a4da0b281930c1a60861519211abd0bd67a9d9ee370bdda2230d2e81
-
Filesize
30KB
MD58993c0784111fc7cd6a90a82303e5f44
SHA18d1ff2fed98ebc608604c555ceb46ca628afb285
SHA2563d0ba88267018f592141ea86592757cf1ecaac1a3a18f99203e0fc5c5eacbd62
SHA512124d16d848dc8ea0a93b292b10ce1fbad23b56b13771d904cf14c19d54478614d214441b05f6cd9e1999b8310fdd26d1c6ecae784be00aecee7e80c96ba4ac88
-
Filesize
30KB
MD5a640aa4ff33662e06a474765df0b2a8d
SHA1c6265225532e389e48c6057bd717b69de2125b61
SHA256078b1943bf7f7955b90abc40f691b27e04376f8c43dd3abc4791614286cd4f23
SHA51259791eef021f94efd9c18737d6c46fbc45add582eec92d5b997cfd66993abc7da872720a037766c3c70862f0654ccf30d122d4a5a6b305151bf8bf1c053a466d
-
Filesize
29KB
MD55bcc643a969559317d09a9c87f53d04e
SHA13602d51cde97de16d8c018225a39d505c803e0fc
SHA256b48f57e90ea9db6d6a296c01e87f8db71e47ab05ab6c2a664cfa9f52cf1d2c18
SHA5124c65772f77e61e64d572df5b1f62733aceb02a5c967c296b303ff17c5d49831e5b7fc3d662724ae3ae1e88cd0fdcb704e838af5d4ae20f2d82b9577f57159159
-
Filesize
30KB
MD5aea23f526ef0c5bb3d2f8fdf192a49ea
SHA14d7695e33ed43c3efb95f304e29675ea885b2939
SHA2563cfe866c151a7e8a208af725c0c6f2a47fc3ada35f9ad3509b16b8d5229318b9
SHA512412e4742ebd46ce38010b4f6a46d8d524025f929ab4658040e271d768e79115d90903403b2f1e51ab910bbdf9677b49439eb3c8afc5959477af198efb0c7c3c9
-
Filesize
29KB
MD5295cd30c00f43d9131621baf4859578f
SHA1cab79a6263b7b0a799461f3e6df41f815029cded
SHA256b851c5a60cb6d1e8dd9aa161106cba99ccea047d0b39d007beaa7b9ef4a83397
SHA5125f5c1e62e6c0e11a63fad68928765e3f504f33cdbb1d9a05cd53cbc3ed145bf3528960a10e3d57e8c83b07c030c72257f403b9a57d12975d3ef8bc255418ad6c
-
Filesize
28KB
MD5c43c1ab37cd93e54068443bc330fb3d2
SHA1ab51a2cbc51b3c17cf184c6d99ac480c02eb63af
SHA2560c26a367355e766402c31fbab102dd1c35300d4a1301417c75be5fc4b3d54680
SHA512ff0193189fb846eb3c4188bb599dad8e6f415ec9612da567d95c9c513defb148b6013208371798d174569b46f443a744e4e8b83aaf139d68c31f7de0f94e63f9
-
Filesize
29KB
MD5a5544f517f7c1bfd1ec6a2e355d5a84c
SHA134a2a4a576300ad55b6757171bcba0fab005daa5
SHA2568274c64bb778b55d912929625cd849adfe733b2dd674d94895d53af8dfaabeca
SHA5129069bcfb736e13499250844dddef40e2cf64937e33ee1f81fc4968f024f7d7b89c6a778866bf1bff98d770686569e4752a473c0adfad4d4099cceda84da3cac3
-
Filesize
29KB
MD5c09876a180731c172fa2532f8be90a3d
SHA14359c7840ddb23142a40aff85129b9920360e954
SHA25650fd548ea12e2b72fc563bc082b870a89a523e8b3a4a0e9b65fe673384da2b58
SHA51291cee1b10fc12a01a2a285e67dba583d6f1bee0716cc89103fee0c7d0f52fadc0f9ac5b13e833834e7279963726950d3897847e7acac61857257fc031692033e
-
Filesize
29KB
MD5ee19156c12d2d7cce9b12e515f9ac6c5
SHA119ad46e40b3c1cb6195231bfcf45bb68ee1b43bf
SHA256c290883b4b99758792284755efa52c12eb09039f0f8027d8ba3b1d4bb2f3846f
SHA512631364472a450519ad8959971d6c319610570ca37b4486ea12d6af5b46aaecbf336aadddd1f3fefba841534ff82adf905b1e1a008638ed784bf08870a3b86ee1
-
Filesize
28KB
MD5eacd4638369bf96ccc7c23af37e15b5d
SHA115c4878b78c06095981abcc589c4a6f265ef96a3
SHA256a53c0fd74995090dbf48bbba4a00560e3cc344ce8120b8b2bfa1f9b953b536ef
SHA51219cc8d25bd8fd84481f77d301f79636208df5807647ddc6cb6beff3882d94672db49daa4ddfff0c334b584742f9d2fea3af73977032d7dfccd0cfd1314af4ae6
-
Filesize
28KB
MD519d44de8f930e07f41f9343478ed5c1d
SHA183ee0c5a86997dd491bd8312d221dde2b2e7d44a
SHA25669d3a21b7723e4df8b7b97e39493081e41231e2d3a3f5a4de462db41339987ec
SHA5124edb82aedfeca743a03815a889eca766fec8083afd0defa098593297a52edaf1780dbd5ad1d3325c614d815d34d8c57ec2283a0db215f94f42819f1890089c4a
-
Filesize
30KB
MD526cbb965c6976f59ac385ef9408bf81a
SHA116bb0530338e600fdfd13a7b03523a715e633bcb
SHA256bed996b25f77c7d4328d96147ed388f1b457abfc0510eb8956be4339d103821a
SHA5121efb1bdf0276de17f8516cde4d435e0be8fd066f52fb5d4c9e2fe2e17a135296ab6b34f523284941beae438e97d7e65de26f0541b7c437bceff229b60da4bb0d
-
Filesize
25KB
MD598f79d77ab05304bba8d60e50914418f
SHA1957590adc0f8a7274e765e2a804c1de7c76e3040
SHA2563764941b873ed59d5bc1097f6b9382ba59c06d443a96ff71ba6b693f161da522
SHA5129ca6af5c14193dce7b50251f1b9205870435e60b5495ab1a9f0d42ca14b98b78fef51bf3cd4165394ca5ba28d0e98bea7642ec67039c0f146383136145c7de59
-
Filesize
24KB
MD5b89ba9ecc6d4c77abff61b1c75fff16c
SHA1f381408f26be2c77c7b59681ad6280a701ccb472
SHA256bbd2c970f747a6ee8e4735939225f607ae630ddc6e2e39954e0300ca9a7a88b2
SHA51253a3db82f4cf5a300a5eab7692f4084451b987ad72ae24d9118d80f18692ac3604981c0e871c7a7625c5153803aea0e093d91822d33af0c10a07bcb6e766a5b6
-
Filesize
29KB
MD5d464fd223ba898e6fef4e485a3118394
SHA159c78983ce859485fea5458ba4e7803c38012b9d
SHA256066c5c4b4c87ffd201d0dbfc43cb7566cfb03a6ed2fbf8698220fb919637294d
SHA5126ac1d5fc59e6b7a10532902b059ac25a2bf58b0a63ab586e89b293e2de732c1d5d580c75ff28e4a2660a6ee3f0389f49e388567bcc07dd6e1cfd5d019db3ea52
-
Filesize
28KB
MD51b1202fc3e46d7b46ce3cb46cdc5ab21
SHA1e76d1065035d86eef011feb3cad3ac38eecd0b7d
SHA256b660a0e1d5161765881e0a7fd9d714abce341403b21f63667ffdedf7d5a254d0
SHA5127f11d5d6995f27bb4f8705ac7310273f070a71adc73cdb70d74766c89437b3e7a10453fc55588ac223fe3b449564758a49380168d779fdb6a4fac3b5cde767ea
-
Filesize
27KB
MD5126036b98853a9d31937f874484dcb83
SHA127ffb8f3f6e966c3b79824357e79eac4ec8ce0a7
SHA25690908e9108adcb0b4df84e4fbd9724e5e7a2d2eb54720fe49f37bdce977be635
SHA512b384657e0ca90270b96cb724aa55c52f5c8b569fdb1a7ee7085c18d6822c39fc81a490128bd42d0aec1c0ddac1853e30718710968f5921a5331211bd33e89316
-
Filesize
29KB
MD5e20f7a758cc9bab3d458d89d828521cc
SHA1cae0a6d29e5b3f0aed0db2d66fe19d5463c09cfb
SHA25692858a377f1ddc353b51bb44ec04f571ff2b4913d3c8104aa01359b72f91f2eb
SHA5128bf9b8c6765820db6dd95303cb996b97649796e14e67b465fded3c24ef180891d58f9fdcb06243ef1d4c5cdd4148f58f64d74d2ceb2cb214051718d33efc9707
-
Filesize
23KB
MD5f7dbd944a9126dbe568faf2489ecf053
SHA116ad534b4fa48d95224c74b8ca4d3d4533c76425
SHA256b1dd9c0fdd11a5f83ed5b7d1fbcd417bfaa94e42035647ca45f20e332b531703
SHA5120b6843fd208ea9448179e63b485c01b5ff824d555cad57cdb6575234bf43d6cf253e9494fa74150b9fa9ace9d1d1ce749e1a77c7b342c10498dd7bd3953d9a27
-
Filesize
28KB
MD5c1557eba649fc78356ed198d6754416d
SHA11ab42e71a88b127c40f8dd6d1b0660f271442a11
SHA2568c5a7b3e9f5a3a64214ca8e9d43ea152f69fc2633f47c0783b90385e00551ef9
SHA512e2f92c8c6ea823e1d716732b4bb5295d34da02d270079f645d9290261728bcf822b7f845f4a37dc2ef844580d6a3650a53c3e80be875eac5dffef651e8607993
-
Filesize
30KB
MD5b61c9c9ea8340b6b3a873162a2710cfe
SHA15017b90dbd61add602681b76542b0bd3974639af
SHA256f3eb2d26173d9ea8e26e234c3c5f91f9eb145fdf8b2b3e5011e0f33394fd8737
SHA5120d32f6a880509472a51ceaa9539e3169505bc6b508664d28c9dfdd1a3a72abec665574dfb89e385c18522166221f1d73741fe62e4ea0860bc132e198614cccf2
-
Filesize
27KB
MD56e6f49c35d2b74090529fc1d8d12eb2e
SHA15a0fc9397872d7d26803276292962cdb0a5e4739
SHA2566a25fc0ab6e2c73eb938b8e0f38578b9a02feb3a0634a16ac41ebc2a9642d260
SHA512d3838a88908b2ab9bf6018dfa4c6f784371774cc0bcc82e180761673a9e527e126fee17a150a51c6d0a1159575e2060c12f85ae751e7a95f0285e816799540bd
-
Filesize
280B
MD5d9c8637127a9af6424680049c92b5374
SHA11dbcbfca3992b22b64b35280f73343b5ef54da3c
SHA256f22636f041e9a5af4ee51307b63534e92345e9e03051b12b3126c68bd71db647
SHA51208989e8d34655cf8dc03b6818d026444d9c1b93a00c9663ddcb6f212f1caa7738b1fbf76bc9761a0ffbbbd2288e60d2e40d2c299b1f00384cca3825330364b4d
-
Filesize
63KB
MD53cb903d34c57a95942e6cdc0ed45418f
SHA10e071a57c081bba8d1e377e4f09c27deeb6731da
SHA256b84ce99fa2971cf555245b5b8220539e16a4e9eab272f9b132b5243d5d48c102
SHA512cec827bf2a7d3ab762fcc1ce15befe5c4db24931b0778720c42a23af2ee052eeaeaa29b0d4cdcc02d2fcdf65d15b8db7425823edf4374fd30c0725e8e538499c
-
Filesize
1.6MB
MD59008b1f2c99b79594ccba4afd923056a
SHA14d88557702696906b44a37b289b4a5716e7c9fbe
SHA2567531341da720162541747b3142722f9c52d9d5fe57678d8aeefa62532014f672
SHA512ab9a48a6816c97d3e5988dacd8a2f270bd30b16cc558e0667c77a65121228bb3de90d03bf8cb48a92fe91c737876e260f2d782cb1aae18f1711e5f5679be9cb6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\02gijqhq.newcfg
Filesize3KB
MD58d016acbb2ff682a82c2e82c128ed2e8
SHA1d7c49b80183599d6eb992a15d6c689ac6fd1d398
SHA25622444a73e53047033a95a7e297a8da348bc311e0f6c9c2172d94aa314e48aa90
SHA51261ece1af7f7cf62449164825360b4a821d40b12c6468c9321e55f65ae375faafffa6fe9f25db13a7f50b222bcf15ee2c0f904ba0e3085fd927356fc8c1f98508
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\04dzy0pw.newcfg
Filesize2KB
MD58c428c79995b95e1c9dfa1e779319d5b
SHA1f79b57518a08b9229fb245bb83f38d7e74106113
SHA256d4d280cf6e208cf479a6d938f02f46132e1652f76c7dbcbc8e7d72f3b95013f2
SHA5127f4a96c21118c68122407e8a8bd38fe989007c2a3b7ea00618147e92fa53b3fcd6fbf5599c3504d80a2b23d1ca13f32cfc2a483d80c53fa62faad2b6dfd429fb
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\04sy4q41.newcfg
Filesize1KB
MD59f145746cc517d24245dcc2af3f8498b
SHA1f1cce0dbfbf0cc404391c370800c444d824a6490
SHA25627dc55d120cf78024f92107a9da77d33e6588ac73d592eebfe84849ad2f0ec72
SHA512a29b13986c907542a28db68c7c0a471d88e3f8c166479ae283a91567623c48584973e2fc571be2703f1bb54053bd186e0951084ef034382406fa53f66b7d4dda
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\0dqxuiws.newcfg
Filesize1KB
MD508120c7275d1112e63ce06285c73477b
SHA1d158dc2b317f271f629807738db63829abb19b29
SHA256a38703cfbd067e0ed8b13dfeca17793091ea8da5b2b7743565bc8a3a31841047
SHA512baca4bce2663ca35b6a97f44883980e0eaf3f4fd2ef2aaec89529e05675ef0d6bbaef9520f2866b40635371f1ae707beab2f59fcda4eafe82cb1c93de0ceb8a2
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\0ej24zjm.newcfg
Filesize3KB
MD517067d4cebe2c82008ddf9413c38e516
SHA1808c740a86a040fd0279c04645ead634ac85672d
SHA25614e6595984c645a91a75449ed65c1a2acd26882105a6fc7dc49a2dfaeaafafcf
SHA5121e31e15f7e6b7f6a7e4f20c1f34c461da1577c50290be7855f75ce0a825ca3cec42375d5c2ebe3f67a3b4fe26b9cedd3aa309dbc02f200f7db71835037d58cba
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\302va1im.newcfg
Filesize1KB
MD547a04bb0f6c4d79bce08ea38b8134365
SHA10be8bed17e48709480e8f27e13e8f0e3a0d38f76
SHA256d09e2f363f711339f56953485a7de375ae7012b61e2069c75ae78ff53a9fc408
SHA51297229ddcf48e2438850e10cb914223a1d7ab7cdce086d8a52673bb5f816269c01659b70e089c68d99507ca8febcb37a3e2b32424d8b98939ae2fcb41223b2f3a
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\3qqxxlp2.newcfg
Filesize1KB
MD5e3bdca0b4cc68de1f98c665d1f9a5757
SHA10442941f73b8f7c2549b817a5382e86de24ec75e
SHA256e3fd58bd594c473d3c7c576f27b698f2952971492b0dc5d162f7efdfdc503dbb
SHA512a06b01a3fc795ad8c3a55b85c130b482584d7576c0d0806aeeb9516f929fbcbcb308db0bb911f59183b7f5cc84b161606fc383309960151aa1122ad49fac354b
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\44yx30i0.newcfg
Filesize4KB
MD5ca7751dc96594d5ad6ca39a62e08e1a5
SHA1fe1bb4644a12932b594df8b469a63063299c19a5
SHA256c022ec241b5df2d0ea0fc1ea80554dd60af110be2a2321fea35878d1a2997191
SHA512504039d750724a5d97a78f08dad88f93d9a0bda6d8a646dba6f339074dfad1726a9044391f3d8db4f784cc8e37bb37124d208a6d41499ea28290ed80ddc4fe55
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\4up5um5t.newcfg
Filesize1KB
MD5adafa8ce339e744aaff9b17069ce36f0
SHA13805e0849e59c8a52118c407c028fc684b9c0488
SHA2569ae12ee02aecd510b73a19ff42c11961427812e62f9ff07146bbbdfcd7a6f226
SHA512096fd7a13b64bd49b82275530eb727faad99c3021f7b9c8f38cb9ad39da7b700c4085ee04fc204e44c8cac9a7e4431873ee9f4aecd0fdcc6b5ed35b0e0dfb775
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\5vm2nni2.newcfg
Filesize2KB
MD5ce9457355000e78597bc24943a04b8fc
SHA1384fecbd093ea4b436586401174de0d3cc01fa47
SHA256574ece359cc471c670f3c87837c0485416174cb7d7f7fc42015ecacd5725f24d
SHA5125428df270550a106728cc87b751f530d54aa0917ecf5dd9bc95cf4a5a8a12e00714c2bbf90a3ef853d17e906011dce76f441df734d811aa9712302444782da65
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\ab5zgyiu.newcfg
Filesize1KB
MD5b83d119e0c786677e9c7d3f090872e12
SHA178230ab10a5f16e78c36567ff1f21a649f6f55e5
SHA2567199db1e316968dc066d2c6028f6139863a7e97c30587834cfd77eaf8fcce6f3
SHA5128195b7a1061fd40542354723aea2aba6ae88ad635602515a02ebadd38200cbf57f3dbd756cd0cd025710aff8fdb050dc6b07695b8391fdceaa7cc1a7dac0c1e3
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\bfkkdifl.newcfg
Filesize943B
MD51dbad9ccd1bb7013b27ddeece8b85828
SHA13f720b45ba93807d1d22337eba52ce523441a4e3
SHA256360037c13d194f87e4d337618a38b0569d95d2e12404963155abd3bd7b7c21ba
SHA5129974925c8b4c880685bbe54679accb0d7ea4093c9ada87af26b91b6d393c61233a8f5ce550680c22ac66fb514dd9ec99382752fef4d5c1ddddbc9504c3fd7a65
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\djiafwmw.newcfg
Filesize949B
MD5f68976d09a952d49bf4eed7d838211f8
SHA104c7f6bfc667b6da3cf980757d1afc526903bbf7
SHA2563d2c9161adf8156f58093b6141a0c53ed9355d60673d93ab696612fa28cba01e
SHA5124f002bfc3bccf846014cbe22b82232a9c73aee0cb22dca5a70447016a856ad0a51e70fe21762314ccc6dbb98ea7b8a776fa5f9a4df7ae3b11ee024a0b81ab301
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\evjqvvsc.newcfg
Filesize1KB
MD57094ffaa86df8459534cf72960c40fdb
SHA1b507011ff71529057f727bd88307e87ec155db54
SHA256c848bf6128fe6b17b50f28c31e47fac5f20504b99290286858cf79d54dc8b883
SHA512d9e221aa9fd16dda17d83fd498caf14c64c071f7d26cbb8f2e14cce442ac6785afd8a07537b41df02c49c82f803de30dfa28338e90ed4ade42a22ada7f9ad361
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\f3v0uzna.newcfg
Filesize2KB
MD53c0b484f05308f8412741ba70d182623
SHA15ba94a5dd17bafa2ba5c65869335e1c4490f21b0
SHA2564b42f9f1e34d6437fbdc10906a2d1d0a435e1ff187f905b12c957625309dc049
SHA512d132dda3fb3c4d1c93e967dd780d2bd13a7ab4ac75028cdb53cbc9a7dd6b491a901e7bafde7961d2186d281882b2cb58acbeb5aaaded9ee60396cc4903e972fd
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\fasotzoe.newcfg
Filesize2KB
MD5329085732fcbd5dbd0815ee35cce2d7e
SHA1583ae3d04e6fdb0ed6e714640770a42533a14a80
SHA256df261dd8b9165f6d66c933cef2066149dbd0a520ae154cb32c77b81d04024fcb
SHA512b79f26816d1c0742277b634557395d64229b39b9d5c7bdbeb610c4bc37e36fe20da35630379c532987f406ed21f30e380c20e48290cffb260ba44e56ddb5e474
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\g1hsuxe3.newcfg
Filesize1KB
MD52109f93cc9470b482e8b62ebbbf8cd52
SHA1612b4c0f8d5cfeaae80d8751ddd0c40cf1c5cc7a
SHA256c31724e09e300575c1bc4f551cc96764bda8c631522073c1638c2d48af6c0e91
SHA512d6af20b7e6653ba98408ee950a6bbc314325cdd55551a7ccd3503a8bbcc2749de7e3265c6dc186cbec5afccb50616154026d9bb03b1d0e14ddbc5f641abd83d9
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\g1kqoesd.newcfg
Filesize1KB
MD5782b36cd615a071de2c451365d60f062
SHA1358c0924a9970764b10a6646450c22b1fbe80e55
SHA256a126a45fc23f6269856fc77d19056e2cbc1b5f11da2d444c58f7722256584c65
SHA512de876f02031edebc3a07d507e29d4af7f6708f25170bb6d619aa3a0242817d0e7eb38c1ff4b22e186bdd42e9dbc9a49e97d4cfb04cd8dd41415569587e963d0d
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\gnq1hqcm.newcfg
Filesize2KB
MD57d54add412b84387afd6eec9c3e7a907
SHA139c966bb74665ef0b689fc284d5f5fb4287cbaf4
SHA2566528dd90fbc5ef4fc5733da734cee478a2a601c7ef91f9551cad90731a7fca66
SHA512a45a153286c7e0186bf5c418903dfa7b750ee51a106330c310c0ee25e92e87e435c8e39c00cfc0d4461a2850d2effb5c0b63e59a4fab6221a8de82d9f7eeddd7
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\h4120yrh.newcfg
Filesize827B
MD5d027e9dd70c5c0d8972f87e0b3bde207
SHA1ebad95b368fe0edeefd8398cebdd3f16b81a6560
SHA256a1da4daeb01a3f3239ab5fd4aa8bc0059c832141f3cb802bb334e3ddfa38cc12
SHA5125f489be1e340daafea432f21ac180e1430873573e6ef8107073e52369787a57d68d126bc61ce95d518621c2b605ed3d33b7b33502263b4182af50519e1fb86a8
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\iyg4jeve.newcfg
Filesize2KB
MD5c780c4660e5566c2fad2d20c2a1d5d33
SHA1e606d1f554fe56b5e9e5c7d51bed8cc789052e0f
SHA25613729b3ad6e9770babe504bebf6df93086ef79b4699c2c118986ac22b9b87f2e
SHA5121fc747538aafac285bc939eccd1bd7d517bc179e7a3f0fbd331f378e33254d17660c8eaf56a56de79049de0d02a5dd14be1b4ace47b7d09aac33501e58635b51
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\jr40b3tg.newcfg
Filesize2KB
MD5eb07c897871bfe255d5dac0634c23bd5
SHA1d8c0538b98c67b72afa53d352b045e973e9b5887
SHA256d3488079a2af0993d6cd338ebb6d38772be220bb18a0b6c37f48d306a4e9c2a8
SHA5122abc53a7de2112a59df5c7fe7a6a8ceae99f3c6bc7efc86fbe1b4fd70c19b7318e63f6f5673732c9f903905169625cb5f049a031336c896d620682b85506ad9d
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\lf4slro2.newcfg
Filesize1KB
MD575d3ae8042e0fd9303782e54fc964da5
SHA194162fe819dc5fca9ffd484d457457ec60084a4e
SHA256fabb05a79c79354d45708a0474584102bb02e7a97968e31b3f558d3cf935a398
SHA51208f92e8947a38ad3659cd4dc2b108046c9b6a6fe814780e8dfede8ec2c17221aaa802b1f4f044bd394da5832511cc37f2bba31bf6193221b482670daf580daea
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\mc30snl5.newcfg
Filesize948B
MD5961a8561bca7266316d4cdbd9fa0cbc2
SHA1176ae77fde1fab4468c7ae610f2376d98fd03b39
SHA2563d3bf4561f8b829dd2674438a87ecb4696f59fe2a8a96f93bada2b99c12d0c5c
SHA5123eb5b8626195fd69a0bc791d53c9e3cda933873b1be268ab31982ec69ea36b8f60e920bab4c852e3348ef84898505c88dfc0ac4c8ba9a9f0824e67c4aae6afe0
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\nmkvxztx.newcfg
Filesize945B
MD5168588ea0cd17959ebd173437830e76c
SHA1df0e676819a94339f8eae6a7c1dea7cd932ea4d2
SHA25673560a81e111d82de816cc460b63bfd8e9fe433e96d77d1661c44124a1851f9d
SHA5123e5ac549062fce52e55f78fcd3c92c1a271345c290bc671f1cfba6bb96d345263234480b337e628df8852a225fc3d6a5b17f6894017469af284243241703f230
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\nqebgok0.newcfg
Filesize3KB
MD53946b9b72e3739367d1ad21fd3932b3e
SHA1a2c1d053bbf7f92060eff69d133a639f430163f6
SHA256e5f6d13adb5b809c61ed39527ecf31ac0947db78c24552bcb32888e4a0743620
SHA51274d5bdc18dd6b124e2f0b6b5e78a090500573c05fdb86c8f5c9aaf76cd2f617efa377fc158e4f7dced169603ff4a7e8b699dd0878918a6ac51c2cb201021755b
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\okelifht.newcfg
Filesize2KB
MD5c5b6f02c22432a891a8db627a068e9e8
SHA16de89e2d500cf4b3e5c354ef7723e163e1ca2efd
SHA25665f1d8d0e24737110c7acad38690a78bc4092cd1a6e6224b692cbb8e8e4abc46
SHA512ef3994772af795554ad833c215c21624a50938d465343f01c40a9b1310b84274f4e2f833d4a2d5e4492408c93a3fdf0f532b944b8ab688c2fef32dbf7dbcc1f3
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\oopmtpd3.newcfg
Filesize704B
MD5fc57652c7453ee98d1f6c7d928a29bcb
SHA18a4f801656219186f4a088da5617aef287b23862
SHA2566c72601734883b0598cee8c0ef8f93bfab09f7d425342b2882af17d06f617d8b
SHA5120e2f1883a710683bc1511f669bf888a1ea8655c612c97baa0bd0cffe9927bea496dfd120b555136e4af1e32910cd0f42afe9feb7831f7a749e49f6a144fc9eff
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\pkurhf12.newcfg
Filesize1KB
MD5c3a37b59a2b1f20c05dd362121c9ecf2
SHA168e3e6bb588349ce57ef9f29b178c474fa346e0d
SHA256d0b90a12c849a482f0f0fffb681392db4a270a02605364e540a597f7a31a130f
SHA5120d4856216e4aca27abd6f9af0c9850b7a59e6c9b95b1c8d179f3edce91f8a6cbc52ffd7028e0eaa9235a990a859addf7e43997a57c3b98e617fe83393ff96fab
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\px511nj3.newcfg
Filesize2KB
MD522da5ee13a56262ec4700e1e14a00d09
SHA1839c5923ed797ec6fb45dc56697cc76f757ef348
SHA2568fa8c769ddad8c3801c0319b511c69c7e408b51c03176ab808797cf1ad36090a
SHA5128fa2255526dd411fd23fa5d6ae499cf70fe163f552fac87645e35028a0e32b1b5112cf082777aa3f1888ffee452f631682aabb0ec95d0128120bf763ad01d136
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\q5mdzgk1.newcfg
Filesize947B
MD565c2a528d9df95cfc55d81a8d0764b81
SHA196469c5138bd70544a0cf238d9b4d24977494ad3
SHA2564ba411f5d57f977c67a5da48ce71bc45feef4dcabdd159e15777eea21f622b4e
SHA51212fe68e157d92cc8ec9789e42d4e554fb283d77a91860ea036ad3e85706c32001e08e8346dac8667c40a82f89e3115c8dd87a143e1d7ec1babdf3e7eb56f8196
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\rqucgdnc.newcfg
Filesize2KB
MD5fcb1bb3ef192772ebbc93a442476839a
SHA1931e3aea46b363818adee718f92f421485104ffa
SHA256471cb61c9dc6590bab797c03ca3f547ea5742a70ca3f24958d7a5b08ad1cd51b
SHA51248367c50e00674f54975587426674a2e4befe5ac141bd0fb4a1ae25caa6800049e2b06d110847bad3050ab625ca816ebdf2372f933dc2313b08c499efc28d8fd
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\trsrrgbp.newcfg
Filesize2KB
MD555c79bb545cc40863edcac8943f9e074
SHA1f7341f0dc1291723320ca82f35bef272692b6f87
SHA25651e521554e545b8d132f6dc1a0fd223ad52a8ab47d6da5d59dd2a3023de79b1b
SHA5126a15026cf8316f974c18aacd3f52af3539e35b9ed5bcffd27613bbeb7d4cf1dd18a7a41e26c03318be3eb926bcf4df38b35e1964634bcf6dffbc1a20c69a4759
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize2KB
MD58bbde45d4063bd54212400779cc6a0dc
SHA19fde3112b8e8525c3996b577d7acc642b4364c4d
SHA25699c63f6f218fe168c5912d15748328e4db8b5f4769a884bea9f3b4395a434bfb
SHA512afac976bab861b274f36d0b5003066a934dae127c84e61129da407b2af63cbc80c0fabb4a4e29d28e5ea8cd07ade6f85e895702d0ded7c592804fa600c02c07d
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize946B
MD565f0d5fe57ed783eedf31fb69caae62d
SHA1b09eecd587b1dadbb79c0504788696f481802316
SHA2565bbd5b7503db069611e0c75da8e2b9ca2b50c737025f4755e80c091ad824adaf
SHA512e1394f32f68ee5d869391ae1d83f0e3ebfbf153ba21c179f7df624b6d8f447ea3d8a27c715adec52ada5e2734d5b3907b6b3c39263219fbed9225ab919cdd191
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize1KB
MD5ccfec8b86d82fb6a27dc2cdf81ed4dae
SHA11032d9f28ef45f40453026dc0f4d1002b7f9208e
SHA256544b537fd5d5834114ad11fee04afac83b1fc2aa2d06468baf7c9c7de17830b5
SHA512c202de2fc531d6156242a2c0e2f15b285b8fdefa1026b7f8f36965021ac82b6c974fd62baa12cf4f06b7fd6d6d54f76ca572ed40b7ee9a49cb538a573f90f4de
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize944B
MD54939488af6745de1b40abf6b2e9c7986
SHA1f130a42b578055f0050024043af56c03dc093250
SHA25612a644d3e9f4f4f76c8c269d97fa517aa7c5a8fe30cf3c35a773f17a9ae1f5ca
SHA512f7d17451208ed689f4570e5150da3f4fe64430c110a4d518d7ca63234f7053cf4b0d245a3d9769d5261a565a4ce91d233df9972ce1332ecda4f014250e532ac0
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize1KB
MD5841cdf41cf08312a610e93e183d43f43
SHA136b7bef2ed1d0d5e0fd80213d4e7edbfff703ca0
SHA25677d0ce69633556eb74200c7f3006f1c66440f360e4504160c16dde834d37ac7a
SHA51276c3feafd4974ccbc84f760a8402b0f7bcd40d279857e64734b32b1d46ab5ba767176e44e25746548ade98c7039575a585614c153e9234e266b836dce9ce651d
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize337B
MD549ebb6c5f0e57196c3087fe55a70b03b
SHA12c8c32c4a6a320cf031536c3a335c98952879773
SHA2560e65396b3cabf4cbf3d94ab96ee573b5faaf082024bc6b877cff1e5cdbb91cad
SHA512b4d23c31d4a6d935c6e34de813d7767dba654a699d3d3fadb6b06d5ab4bd04af47f0ef362c81fea5b0a1cfdb783d332e87c9fb36e226695986286c2772cd3078
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize460B
MD52b6858d8061adb98098361dfd6e8c1f0
SHA15b7f9fc197f60986b698937023b5a9a5a04ff4d6
SHA256ed0ad05ec168d671a1a4d09a6dd26b77c5274c8426b4532de3702ddb6e901a8d
SHA51276e78e193802fbcbf53383a05ec2fafde20f96c62c7f716bd01f5975ed76c1918b383fb0c0efcdd6db5ec65a0b1672853a16e12f4441d5faa20785657dfa798b
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize3KB
MD59a25c2b9984bb963248a83a2dd991fee
SHA116fde46446272abf2ba3998a7240deaa532fb46e
SHA2566523485b53aac6333d7890d4644b3772d74356297aa27fcc152decbdbe6ad9bd
SHA512a50ecff4cbf5b501909f4ce7c113ae960b41155d2e0291bcd34e05ac6826dcea470093d8377830cfa182962c3095f4bf35d66e443f12bf50c72acd45d1a9feb1
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize581B
MD56672a0335cd1d1f4941ac7225daef652
SHA133fb88da363976a0ef03a642f7761f40efb9ceac
SHA2568e67420e7d15ece28da420c4fb316183224254ec3ae62203c0f230fc54c3550c
SHA512a3070f476161f16b2e614197ab63e6d53d6d108978ade95cb3b1933dd887e0972803d8e00b05e083cbea10d2bd2739935beb4cab31af343522e03d27d1cea8d1
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize3KB
MD5578eec20aa3c481d1c3fb926959eb959
SHA1e6e6f032c814e339dd7c384c2b58afd126032ffc
SHA25660cebcdd5291c1c5e169a9e7b74efa9ff52e2d5eb78259e2477fbeb28dec81db
SHA512a069bb3f6bcd1f4b936d32b4b135d12bff246ddf88022e676b5f323bb7943a6bfe0fe887a7bf2910ee5b9fd7871fb1253cf7cfcdb0b43527846bfb55dac74ae6
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize4KB
MD5abf7735a928ee5b90ec59cad010367d9
SHA1cff0e360848d7279727a97f63a91a37f16f32da9
SHA256aa6f9c3d76cd0fa6afa77179e8eed0f2c079a21a5a578ea75c506f969f35fdb8
SHA512655015c2a5ef7af8bcea95767f49d20df1c2f83ca2b027ee45ef0aefc8dd4269573cfec293201e490dedb88627f3614864e9093e1dc37c15e1230b2cf7f31a22
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize3KB
MD58509dcfc9fbf2fea2571c3464a7b6460
SHA1c228f11f9e5cbd04fca6ec32cf61d7d7bc2fc415
SHA2564e34e803529bf9fce196465581d767867283407abe00fcd474538322afcfa05b
SHA512bf91d3f6b4db89c962575bfca4df2c9a16019565444a071ada4b6b69d2c4f321fe05131077000b8d81d6abfe4e3f4115f9d178236bdf2293017a91038ab2b081
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\user.config
Filesize1KB
MD5d61803aca9a3547642c064e2eeac2924
SHA150812a10ab072214203dae23a52a4e2472fff521
SHA256568d5193f1efa3d4570c93f1fd4e466a68222189a9443cc44e1cfac46c7f7987
SHA512753f781523441381eebb0ef53fedeb3c8745e215be3831f6280ab5af9377ea6cf65235609e8a4915b47480689f0ce8d233a631abe45e7f7243001afca1297ced
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\uzuqmvxy.newcfg
Filesize2KB
MD58f21314c6f81a79565f71db70b97171a
SHA1f0e70429ea75d103d88402ffa2694bb4d951df00
SHA2568d45dd15ef91a7109b0b2ab7063b36b5d5767451d268e6901c38e97c4922b4bb
SHA512258cd528a16809268315e49e436a8410606454bfd0974107a7161cd6d1e229525bd145b869da358bbae814e703d9f297feeb649dbf595714d0f12d57058bdff3
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\w042idde.newcfg
Filesize3KB
MD5d05c5ba271b442c8fb62429b0eaeab82
SHA1b10fc33472c7590667f76e06b39873f89463e215
SHA256265fe950160e16369cfe2822816e260989b42ec1bc90b3578787002b4af472ba
SHA512b3f5ab41be2299dc2012c080e51d751274f0d29f030d73584fc432156720279e5da067d4cfe8b3315146426024815ccf251c1a366eeba2f15e24ee4d9e193f58
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\w3xk4mfv.newcfg
Filesize4KB
MD5f3758cf528cd4b7c41e909029339d22f
SHA1e19340f7390e58814544341c740ae9116909905d
SHA25616fb33d6ace185369b2c7de8685fd65711d613e9c9d087a62804113d56bb4dda
SHA5122ba4f7f7aaaf1398e01a95ae0d9a2d3a0be1d854d472337338213ccd5c764797ae7a74960019657d6c6b5a964443a2ec9768e462fea0e7a29d5a98e9457cdc9b
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\xsrc5mum.newcfg
Filesize3KB
MD56fa70f562f4640866cbfbfe2243e4bea
SHA13d89acc780a65c8ce9d1e4d589f1783eca17fd63
SHA256d46d35d576ead099119d0a65446d58b767528cfd717d744bb8f66bce0d85c226
SHA5125cea00a535b873aa4fbbb7d99c75c076589c901542da12ed7b1be635eacd413bc29427da748a6e56079f208339d094cd68df95f0e16c0b42885123d114a107ec
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\ygomee5z.newcfg
Filesize2KB
MD59b8a58cd1aefb80ad09d3fe4921ffc92
SHA1848b38e7d501ca03a8096d237cfa32f57dfa6c37
SHA2563568256135398004b2beccbe7a73fed1818ea6182fb016156953c3930771ce5f
SHA512ed5fd1208b7974d717be78e8b124fed5ba252e739a556ae760aea24714a5f4bcdea04bf1ac18926b090501417a04d31b5439e2ae114ed0e4ee0a2d297f690514
-
C:\Users\Admin\AppData\Local\https___toxtweaks.com_\ToX_Free_Utility.exe_Url_4wg4edsnss5c5dbmj03msugpivfwppgy\2.0.0.0\z5rgixay.newcfg
Filesize2KB
MD53e71af4b4cfe60b82c5d9e490b2d8a5a
SHA164fc00071b449ef8cb080eddd718524fa1ef874e
SHA2568ae4b798a9c8f272cbbcf6f64c2a5a32984e8247790f0f21a0359977372d7080
SHA512d1a8c0f9cf60830e78b472fe1a1b31cab179504437938674cffbeddf3ac435d977e4055ee68292fd36ef0774e35e1bcd0e8b7b308d2878d90d903bcccfc1e25c
-
Filesize
2.1MB
MD5c19e9e6a4bc1b668d19505a0437e7f7e
SHA173be712aef4baa6e9dabfc237b5c039f62a847fa
SHA2569ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82
SHA512b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de
-
Filesize
6.4MB
MD53470130cafb10478112c1d9f79050786
SHA150a2b632649d8b40e8e87aa772ed28893e3ed053
SHA256b5e97f843c0c575f3058f9701d07350cd43022042aa587d1b51ebab22067b229
SHA5123cf0b55d59a7ac666193c34abbb54692c42c98c70015c82ab65be1566977f3037757f9c6da6d4e202c2b83728a28073b6289324a8bd047eb5c2ada12c3891bfc
-
Filesize
4KB
MD5d4b051447945580e846848ded72c11b2
SHA1898e59d491bcbc3d77ee89ed1a76deceac7bd5be
SHA2562171a301e13b7eb1c57dd5c61e38f899aa566c778426c1af39720354ba04d707
SHA5121cd36e870a86c9f2dbb7ddc7103c7c35b91fbb9713a5da5cfba3eea52c5c7c43962b9bf65589df2238af47e2563a193720d4e39453107b97f38df9fcf92e6f95