Analysis
-
max time kernel
490s -
max time network
514s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 10:39
Static task
static1
Behavioral task
behavioral1
Sample
pepe.jpg
Resource
win10v2004-20241007-en
Errors
General
-
Target
pepe.jpg
-
Size
9KB
-
MD5
75494425adf92da992dc799a556f65ea
-
SHA1
03a82524d97f766d2cd7305e45566e560197a512
-
SHA256
463a64d183f90599991de74c1b48330ad796fcd7aa733ac1a9be131eaa80618c
-
SHA512
20ddaec720ba304b644a010bfb3676fe13f64d9e7099e333051e5db43e2563d983fab29565e5f7902b017217ff450f5ce9ad68f2fa155ec780bbdd2914a117f7
-
SSDEEP
192:PT5eLK+PqoNaK7HrML4vT4ZkGorW+1ewk108rCqbWOqQlW:PlCBbw2xrWkb8rCqKqW
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideRealtimeScanDirection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableInformationProtectionControl = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableBehaviorMonitoring = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\IOAVMaxSize = "1298" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIntrusionPreventionSystem = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIntrusionPreventionSystem = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableOnAccessProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableOnAccessProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableInformationProtectionControl = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\IOAVMaxSize = "1298" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection = "0" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIntrusionPreventionSystem = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIntrusionPreventionSystem = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableOnAccessProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIntrusionPreventionSystem = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideRealtimeScanDirection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIntrusionPreventionSystem = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideRealtimeScanDirection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableInformationProtectionControl = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableRealtimeMonitoring = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableOnAccessProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIntrusionPreventionSystem = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\IOAVMaxSize = "1298" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideRealtimeScanDirection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableInformationProtectionControl = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIntrusionPreventionSystem = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\IOAVMaxSize = "1298" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableIOAVProtection = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\LocalSettingOverrideDisableBehaviorMonitoring = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" regedit.exe -
Modifies firewall policy service 3 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Configurable\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\RestrictedServices\Static\System regedit.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security regedit.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters regedit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\FirewallOverride = "1" regedit.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3500 bcdedit.exe 1100 bcdedit.exe -
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\WdmCompanionFilter.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\i8042prt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\stream.sys cmd.exe File opened for modification C:\Windows\System32\drivers\tcpipreg.sys cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\SensorsCx.dll.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\Microsoft.Bluetooth.AvrcpTransport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\parport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\cdrom.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\volmgrx.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hidusb.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ks.sys cmd.exe File opened for modification C:\Windows\System32\drivers\VerifierExt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\EhStorTcgDrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\tunnel.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\usbehci.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\storqosflt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\en-US\wpdmtpdr.dll.mui cmd.exe File opened for modification C:\Windows\System32\drivers\UsbPmApi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\kbdclass.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wmiacpi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Acx01000.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mup.sys cmd.exe File opened for modification C:\Windows\System32\drivers\urscx01000.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\IPMIDRV.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\ndis.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\Microsoft.Bluetooth.Profiles.HidOverGatt.dll cmd.exe File opened for modification C:\Windows\System32\drivers\wfplwfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\umpass.sys cmd.exe File opened for modification C:\Windows\System32\drivers\winhvr.sys cmd.exe File opened for modification C:\Windows\System32\drivers\dfsc.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pmem.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\processr.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\refsv1.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\mshwnclx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\WppRecorder.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\tsusbflt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\mcd.sys cmd.exe File opened for modification C:\Windows\System32\drivers\partmgr.sys cmd.exe File opened for modification C:\Windows\System32\drivers\storport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\vmgencounter.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\wdf01000.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\tsusbhub.sys cmd.exe File opened for modification C:\Windows\System32\drivers\VMBusHID.sys cmd.exe File opened for modification C:\Windows\System32\drivers\vpci.sys cmd.exe File opened for modification C:\Windows\System32\drivers\beep.sys cmd.exe File opened for modification C:\Windows\System32\drivers\bthmodem.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Dumpata.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rdyboost.sys cmd.exe File opened for modification C:\Windows\System32\drivers\watchdog.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wimmount.sys cmd.exe File opened for modification C:\Windows\System32\drivers\dam.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mpsdrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\stornvme.sys cmd.exe File opened for modification C:\Windows\System32\drivers\usbd.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wanarp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\condrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\qwavedrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wof.sys cmd.exe File opened for modification C:\Windows\System32\drivers\netio.sys cmd.exe File opened for modification C:\Windows\System32\drivers\raspptp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\refs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\winhv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\bridge.sys cmd.exe File opened for modification C:\Windows\System32\drivers\cnghwassist.sys cmd.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\System32\wintrust.dll cmd.exe -
Modify Registry: Disable Windows Driver Blocklist 2 TTPs 2 IoCs
Disable Windows Driver Blocklist via Registry.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\VulnerableDriverBlocklistEnable = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\CI\Config\VulnerableDriverBlocklistEnable = "0" regedit.exe -
Boot or Logon Autostart Execution: LSASS Driver 2 TTPs 2 IoCs
Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\RunAsPPL = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\RunAsPPL = "0" regedit.exe -
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\System32\spool\prtprocs\x64\winprint.dll cmd.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Windows\BITLOC~1\autorun.inf cmd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\uk-UA\PhotoScreensaver.scr.mui cmd.exe File opened for modification C:\Windows\System32\Dism\it-IT\CbsProvider.dll.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\dxgkrnl.sys.mui cmd.exe File opened for modification C:\Windows\System32\provsvc.dll cmd.exe File opened for modification C:\Windows\System32\it-IT\certcredprovider.dll.mui cmd.exe File opened for modification C:\Windows\System32\spp\tokens\skus\IOTENT~1\IoTEnterprise-ppdlic.xrm-ms cmd.exe File opened for modification C:\Windows\System32\Configuration\BaseRegistration\ja-JP\MSFT_DSCMetaConfiguration.mfl cmd.exe File opened for modification C:\Windows\System32\de-DE\runas.exe.mui cmd.exe File opened for modification C:\Windows\System32\en-US\sechost.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\find.exe.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\klist.exe.mui cmd.exe File opened for modification C:\Windows\System32\psmsrv.dll cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Archive\it-IT\ArchiveResources.psd1 cmd.exe File opened for modification C:\Windows\System32\de-DE\SharedRealitySvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\scansetting.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\joy.cpl.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\SCardDlg.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\BWContextHandler.dll.mui cmd.exe File opened for modification C:\Windows\System32\spp\tokens\skus\SERVER~1\ServerRdsh-ppdlic.xrm-ms cmd.exe File opened for modification C:\Windows\System32\wbem\en-US\appbackgroundtask.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\wmipicmp.mof cmd.exe File opened for modification C:\Windows\System32\de-DE\FXSUTILITY.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\SDFLauncher.inf_loc cmd.exe File opened for modification C:\Windows\System32\en-US\MSVidCtl.dll.mui cmd.exe File opened for modification C:\Windows\System32\zh-TW\fms.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\hidir.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\netvf63a.inf_loc cmd.exe File opened for modification C:\Windows\System32\en-US\ResetEngine.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\utcutil.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\wersvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\BCP47mrm.dll cmd.exe File opened for modification C:\Windows\System32\de-DE\csrss.exe.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\mdmfj2.inf_amd64_167948d0c94abc27\mdmfj2.inf cmd.exe File opened for modification C:\Windows\System32\es-ES\AudioSes.dll.mui cmd.exe File opened for modification C:\Windows\System32\MicrosoftEdgeCP.exe cmd.exe File opened for modification C:\Windows\System32\PrintBrmUi.exe cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\SDBUS~1.INF\sdbus.sys cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\rawsilo.inf_loc cmd.exe File opened for modification C:\Windows\System32\en-US\ajrouter.dll.mui cmd.exe File opened for modification C:\Windows\System32\IME\SHARED\IMESEARCHPS.DLL cmd.exe File opened for modification C:\Windows\System32\ja-jp\usbmon.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\devenum.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\imaadp32.acm.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\wiadss.dll.mui cmd.exe File opened for modification C:\Windows\System32\regsvr32.exe cmd.exe File opened for modification C:\Windows\System32\Speech_OneCore\common\de-DE\DictationCommands.0407.grxml cmd.exe File opened for modification C:\Windows\System32\es-ES\workfolderssvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\gpprefcl.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\LockScreenContent.dll.mui cmd.exe File opened for modification C:\Windows\System32\LanguageOverlayUtil.dll cmd.exe File opened for modification C:\Windows\System32\C_10017.NLS cmd.exe File opened for modification C:\Windows\System32\de-DE\fingerprintcredential.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\authfwgp.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\halextintclpiodma.inf_amd64_7f59f2c73a7fab14\HalExtIntcLpioDMA.dll cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\NTPRIN~3.INF\Amd64\STDDTYPE.GDL cmd.exe File opened for modification C:\Windows\System32\en-US\wcnwiz.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\Windows.Media.MediaControl.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\wlanmm.dll.mui cmd.exe File opened for modification C:\Windows\System32\AppVStreamMap.dll cmd.exe File opened for modification C:\Windows\System32\C_1256.NLS cmd.exe File opened for modification C:\Windows\System32\de-DE\ConsentUX.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\en-US\EmbeddedLockdownWmi.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\cscui.dll.mui cmd.exe File opened for modification C:\Windows\System32\TransliterationRanker.dll cmd.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
description ioc Process File opened for modification C:\Windows\System32\termsrv.dll cmd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Cursors\beam_im.cur cmd.exe File opened for modification C:\Windows\servicing\Packages\MI9F11~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\MI7FAF~1.CAT cmd.exe File opened for modification C:\Windows\ImmersiveControlPanel\images\phone.png cmd.exe File opened for modification C:\Windows\Installer\$PATCH~1\Managed\68AB67~1\157~1.200\UKRAINE.TXT cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\V20~1.507\System.EnterpriseServices.Wrapper.dll cmd.exe File opened for modification C:\Windows\PolicyDefinitions\TabletPCInputPanel.admx cmd.exe File opened for modification C:\Windows\servicing\INBOXF~1\metadata\RSATCE~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\HyperV-VmChipset-Package~31bf3856ad364e35~amd64~en-US~10.0.19041.1.cat cmd.exe File opened for modification C:\Windows\rescache\_merged\330034~1\452203~1.PRI cmd.exe File opened for modification C:\Windows\Resources\Ease of Access Themes\hc1.theme cmd.exe File opened for modification C:\Windows\diagnostics\scheduled\Maintenance\es-ES\CL_LocalizationData.psd1 cmd.exe File opened for modification C:\Windows\diagnostics\system\Power\de-DE\Power_Troubleshooter.psd1 cmd.exe File opened for modification C:\Windows\diagnostics\system\Video\es-ES\CL_LocalizationData.psd1 cmd.exe File opened for modification C:\Windows\Installer\$PATCH~1\Managed\68AB67~1\157~1.200\PDDOM~1.API cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\fr\System.Workflow.ComponentModel.resources.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\fr\System.ServiceModel.Activation.resources.dll cmd.exe File opened for modification C:\Windows\Resources\Ease of Access Themes\hc2.theme cmd.exe File opened for modification C:\Windows\servicing\INBOXF~1\metadata\LA4094~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\HY099A~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\MI2A31~1.CAT cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\es\System.Data.Entity.Design.resources.dll cmd.exe File opened for modification C:\Windows\servicing\Packages\MID3CC~1.CAT cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\monaco-editor\min\vs\basic-languages\src\less.js cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\storage\images\clearCookies.png cmd.exe File opened for modification C:\Windows\Globalization\ELS\SPELLD~1\Fluency\uk-UA\emoji_bg_c.lm2 cmd.exe File opened for modification C:\Windows\Installer\$PATCH~1\Managed\1926E8~1\100~1.402\F_9587~1 cmd.exe File opened for modification C:\Windows\servicing\INBOXF~1\metadata\LA47EA~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-OneCore-LibreSSL-Package~31bf3856ad364e35~amd64~~10.0.19041.1.cat cmd.exe File opened for modification C:\Windows\servicing\Packages\MI1322~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\MUCBE7~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-Security-SPP-Component-SKU-Enterprise-Default-Package~31bf3856ad364e35~amd64~~10.0.19041.1.cat cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\network\Images\i_clearOnNavigate.png cmd.exe File opened for modification C:\Windows\diagnostics\system\Printer\RS_ProcessPrinterjobs.ps1 cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\IEExec.exe cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\JA\System.Security.Resources.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\System.Web.RegularExpressions.dll cmd.exe File opened for modification C:\Windows\rescache\_merged\398301~1\229322~1.PRI cmd.exe File opened for modification C:\Windows\servicing\Packages\MI5785~1.CAT cmd.exe File opened for modification C:\Windows\diagnostics\system\Power\uk-UA\RS_ResetDisplayIdleTimeout.psd1 cmd.exe File opened for modification C:\Windows\diagnostics\system\WINDOW~3\DiagPackage.diagpkg cmd.exe File opened for modification C:\Windows\INF\ipoib6x.inf cmd.exe File opened for modification C:\Windows\servicing\INBOXF~1\metadata\LA4AF8~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\MIA3D9~1.CAT cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\debugger\images\notAFunctionIconMapped.png cmd.exe File opened for modification C:\Windows\servicing\INBOXF~1\metadata\LAC5E1~1.MUM cmd.exe File opened for modification C:\Windows\servicing\Packages\LANGUA~4.CAT cmd.exe File opened for modification C:\Windows\INF\intelpmax.inf cmd.exe File opened for modification C:\Windows\Installer\$PATCH~1\Managed\68AB67~1\157~1.200\TESSEL~1.X3D cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\TLBREF.DLL cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\es\System.Data.Linq.resources.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\V20~1.507\fr\aspnet_regbrowsers.resources.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v3.5\default.win32manifest cmd.exe File opened for modification C:\Windows\servicing\Packages\MI792E~1.CAT cmd.exe File opened for modification C:\Windows\servicing\Packages\MI9A05~1.CAT cmd.exe File opened for modification C:\Windows\Media\notify.wav cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\de\System.Runtime.DurableInstancing.resources.dll cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\normnfd.nlp cmd.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\3082\cscui.dll cmd.exe File opened for modification C:\Windows\PolicyDefinitions\Printing.admx cmd.exe File opened for modification C:\Windows\servicing\Packages\Microsoft-Windows-PeerDist-Client-Group-Package~31bf3856ad364e35~amd64~~10.0.19041.1.cat cmd.exe File opened for modification C:\Windows\SystemApps\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\Loading.htm cmd.exe File opened for modification C:\Windows\SystemApps\MICROS~1.MIC\de-DE\assets\ERRORP~1\needhvsi.html cmd.exe File opened for modification C:\Windows\SystemApps\MICROS~1.MIC\fr-FR\assets\ERRORP~1\pdferrorrenewrentallicense.html cmd.exe -
pid Process 4356 powershell.exe 3756 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 4144 timeout.exe 4624 timeout.exe 2544 timeout.exe 2096 timeout.exe 2216 timeout.exe 2100 timeout.exe 1148 timeout.exe 2344 timeout.exe 4576 timeout.exe 4932 timeout.exe 1716 timeout.exe 4800 timeout.exe 5080 timeout.exe 4180 timeout.exe 4412 timeout.exe 2452 timeout.exe 4632 timeout.exe 836 timeout.exe 3964 timeout.exe 2232 timeout.exe 3944 timeout.exe 2824 timeout.exe 3648 timeout.exe 2216 timeout.exe 2312 timeout.exe 1412 timeout.exe 1572 timeout.exe 3664 timeout.exe 3888 timeout.exe 5048 timeout.exe 3524 timeout.exe 4904 timeout.exe 3736 timeout.exe 1648 timeout.exe 4128 timeout.exe 3624 timeout.exe 4008 timeout.exe 4004 timeout.exe 1584 timeout.exe 2908 timeout.exe 1980 timeout.exe 3248 timeout.exe 412 timeout.exe 3620 timeout.exe 4448 timeout.exe 1216 timeout.exe 2008 timeout.exe 5028 timeout.exe 2376 timeout.exe 3764 timeout.exe 4604 timeout.exe 5100 timeout.exe 632 timeout.exe 4844 timeout.exe 4880 timeout.exe 2532 timeout.exe 4928 timeout.exe 1840 timeout.exe 3420 timeout.exe 4180 timeout.exe 512 timeout.exe 2372 timeout.exe 592 timeout.exe 5108 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Gathers system information 1 TTPs 4 IoCs
Runs systeminfo.exe.
pid Process 4904 systeminfo.exe 5096 systeminfo.exe 3792 systeminfo.exe 3964 systeminfo.exe -
Kills process with taskkill 1 IoCs
pid Process 396 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\AppHost\PreventOverride = "0" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\AppHost\PreventOverride = "0" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\MenuShowDelay = "1" regedit.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WaitToKillAppTimeout = "1" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\AutoEndTasks = "1" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\HungAppTimeout = "1000" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Desktop regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\LowLevelHooksTimeout = "1" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\HungAppTimeout = "1000" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WaitToKillServiceTimeout = "1" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ThumbnailLivePreviewHoverTime = "1" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter\PreventOverride = "0" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ThumbnailLivePreviewHoverTime = "1" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WaitToKillServiceTimeout = "1" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\PhishingFilter\PreventOverride = "0" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\AutoEndTasks = "1" regedit.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" PowerRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" PowerRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ PowerRun.exe -
Modifies registry class 29 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\ms-cxh regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E48B2549-D510-4A76-8A5F-FC126A6215F0}\InprocServer32 regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\InProcServer32 regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppUserModelId\Windows.Defender regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E48B2549-D510-4A76-8A5F-FC126A6215F0} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E48B2549-D510-4A76-8A5F-FC126A6215F0}\InprocServer32 regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E48B2549-D510-4A76-8A5F-FC126A6215F0} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\ShellFolder regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\Instance regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\ShellFolder regedit.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings msedge.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppUserModelId\Microsoft.Windows.Defender regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\Instance\InitPropertyBag regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6} regedit.exe Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\AppX9kvz3rdv8t7twanaezbwfcdgrbg3bck0\Application regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\DefaultIcon regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\Instance\InitPropertyBag regedit.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\InProcServer32 regedit.exe Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\AppX9kvz3rdv8t7twanaezbwfcdgrbg3bck0\DefaultIcon regedit.exe Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\AppX9kvz3rdv8t7twanaezbwfcdgrbg3bck0\Shell regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\DefaultIcon regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BB64F8A7-BEE7-4E1A-AB8D-7D8273F7FDB6}\Instance regedit.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\AppX9kvz3rdv8t7twanaezbwfcdgrbg3bck0\Shell\open\command regedit.exe Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\AppX9kvz3rdv8t7twanaezbwfcdgrbg3bck0\Shell\open regedit.exe Key deleted \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\AppX9kvz3rdv8t7twanaezbwfcdgrbg3bck0 regedit.exe -
Runs .reg file with regedit 14 IoCs
pid Process 4248 regedit.exe 5112 regedit.exe 1232 regedit.exe 548 regedit.exe 2824 regedit.exe 3844 regedit.exe 2424 regedit.exe 2268 regedit.exe 1592 regedit.exe 4464 regedit.exe 3008 regedit.exe 4760 regedit.exe 3068 regedit.exe 3848 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 powershell.exe 316 powershell.exe 3376 msedge.exe 3376 msedge.exe 744 msedge.exe 744 msedge.exe 2728 identity_helper.exe 2728 identity_helper.exe 4948 msedge.exe 4948 msedge.exe 592 msedge.exe 592 msedge.exe 4276 msedge.exe 4276 msedge.exe 1248 identity_helper.exe 1248 identity_helper.exe 2348 msedge.exe 2348 msedge.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 2356 msedge.exe 2356 msedge.exe 816 msedge.exe 816 msedge.exe 724 identity_helper.exe 724 identity_helper.exe 2092 msedge.exe 2092 msedge.exe 2376 PowerRun.exe 2376 PowerRun.exe 2260 PowerRun.exe 2260 PowerRun.exe 2260 PowerRun.exe 2260 PowerRun.exe 548 PowerRun.exe 548 PowerRun.exe 548 PowerRun.exe 548 PowerRun.exe 4348 PowerRun.exe 4348 PowerRun.exe 4348 PowerRun.exe 4348 PowerRun.exe 4360 PowerRun.exe 4360 PowerRun.exe 4360 PowerRun.exe 4360 PowerRun.exe 4820 PowerRun.exe 4820 PowerRun.exe 4820 PowerRun.exe 4820 PowerRun.exe 3964 PowerRun.exe 3964 PowerRun.exe 3940 PowerRun.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2624 OpenWith.exe 2700 OpenWith.exe 2376 PowerRun.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 33 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 816 msedge.exe 816 msedge.exe 816 msedge.exe 816 msedge.exe 816 msedge.exe 816 msedge.exe 816 msedge.exe 816 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 316 powershell.exe Token: SeDebugPrivilege 1972 taskmgr.exe Token: SeSystemProfilePrivilege 1972 taskmgr.exe Token: SeCreateGlobalPrivilege 1972 taskmgr.exe Token: 33 1972 taskmgr.exe Token: SeIncBasePriorityPrivilege 1972 taskmgr.exe Token: SeDebugPrivilege 2260 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 2260 PowerRun.exe Token: SeIncreaseQuotaPrivilege 2260 PowerRun.exe Token: 0 2260 PowerRun.exe Token: SeDebugPrivilege 548 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 548 PowerRun.exe Token: SeIncreaseQuotaPrivilege 548 PowerRun.exe Token: SeDebugPrivilege 4348 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4348 PowerRun.exe Token: SeIncreaseQuotaPrivilege 4348 PowerRun.exe Token: 0 4348 PowerRun.exe Token: SeDebugPrivilege 4360 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4360 PowerRun.exe Token: SeIncreaseQuotaPrivilege 4360 PowerRun.exe Token: SeDebugPrivilege 4820 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4820 PowerRun.exe Token: SeIncreaseQuotaPrivilege 4820 PowerRun.exe Token: 0 4820 PowerRun.exe Token: SeDebugPrivilege 3964 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 3964 PowerRun.exe Token: SeIncreaseQuotaPrivilege 3964 PowerRun.exe Token: SeDebugPrivilege 3940 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 3940 PowerRun.exe Token: SeIncreaseQuotaPrivilege 3940 PowerRun.exe Token: 0 3940 PowerRun.exe Token: SeDebugPrivilege 4960 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4960 PowerRun.exe Token: SeIncreaseQuotaPrivilege 4960 PowerRun.exe Token: SeDebugPrivilege 3636 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 3636 PowerRun.exe Token: SeIncreaseQuotaPrivilege 3636 PowerRun.exe Token: 0 3636 PowerRun.exe Token: SeDebugPrivilege 4312 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4312 PowerRun.exe Token: SeIncreaseQuotaPrivilege 4312 PowerRun.exe Token: SeDebugPrivilege 3756 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 3756 PowerRun.exe Token: SeIncreaseQuotaPrivilege 3756 PowerRun.exe Token: 0 3756 PowerRun.exe Token: SeDebugPrivilege 3972 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 3972 PowerRun.exe Token: SeIncreaseQuotaPrivilege 3972 PowerRun.exe Token: SeDebugPrivilege 5048 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 5048 PowerRun.exe Token: SeIncreaseQuotaPrivilege 5048 PowerRun.exe Token: 0 5048 PowerRun.exe Token: SeDebugPrivilege 2092 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 2092 PowerRun.exe Token: SeIncreaseQuotaPrivilege 2092 PowerRun.exe Token: SeDebugPrivilege 2972 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 2972 PowerRun.exe Token: SeIncreaseQuotaPrivilege 2972 PowerRun.exe Token: 0 2972 PowerRun.exe Token: SeDebugPrivilege 4084 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4084 PowerRun.exe Token: SeIncreaseQuotaPrivilege 4084 PowerRun.exe Token: SeDebugPrivilege 4056 PowerRun.exe Token: SeAssignPrimaryTokenPrivilege 4056 PowerRun.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe 1972 taskmgr.exe -
Suspicious use of SetWindowsHookEx 37 IoCs
pid Process 2624 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2700 OpenWith.exe 2376 PowerRun.exe 2260 PowerRun.exe 548 PowerRun.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 4392 744 msedge.exe 107 PID 744 wrote to memory of 4392 744 msedge.exe 107 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 812 744 msedge.exe 108 PID 744 wrote to memory of 3376 744 msedge.exe 109 PID 744 wrote to memory of 3376 744 msedge.exe 109 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110 PID 744 wrote to memory of 1232 744 msedge.exe 110
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\pepe.jpg1⤵PID:2444
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /s /q C:2⤵
- Kills process with taskkill
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9841246f8,0x7ff984124708,0x7ff9841247182⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4104 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,17993494428812441932,16461779964283279378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\Windows-Destroyer-main\Windows-Destroyer-main\destroy.bat" "1⤵
- Drops file in System32 directory
PID:724
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Windows-Destroyer-main\Windows-Destroyer-main\How do I use this.txt1⤵PID:3748
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\Windows-Destroyer-main\Windows-Destroyer-main\destroy.bat"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Boot or Logon Autostart Execution: Print Processors
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies termsrv.dll
- Drops file in Windows directory
PID:4524
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Windows-Destroyer-main\Windows-Destroyer-main\How do I use this.txt1⤵PID:3220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9841246f8,0x7ff984124708,0x7ff9841247182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2168,9831124000229343555,4553490087448288391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Install-Code.bat" "1⤵PID:412
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:4632
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵PID:2868
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:5080
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:4448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Install-Code.bat" "1⤵PID:3448
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:2532
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:2312
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:1216
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Install-Code.bat" "1⤵PID:3540
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:1412
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:4008
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:4928
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:512
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Engine-Code.bat" "1⤵PID:3480
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:5096
-
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:3792
-
-
C:\Windows\system32\tree.comtree C:\Users\Admin /F2⤵PID:1716
-
-
C:\Windows\system32\tree.comtree /F2⤵PID:2376
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2100
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2096
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3964
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4604
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2372
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4004
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3764
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 32⤵
- Delays execution with timeout.exe
PID:2216
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4180
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2344
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4904
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:5100
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3248
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2232
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4144
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4624
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:5028
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:412
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3620
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 32⤵
- Delays execution with timeout.exe
PID:1148
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4412
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵PID:408
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:1584
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4932
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2376
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:1716
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3944
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:632
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2824
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3648
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2008
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3888
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3736
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:592
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:1840
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:5048
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4844
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4800
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3420
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2216
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵PID:3336
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 32⤵
- Delays execution with timeout.exe
PID:1648
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 52⤵
- Delays execution with timeout.exe
PID:4880
-
-
C:\Windows\system32\msg.exemsg Admin "The product key has been successfully activated: W269N-WFGWX-YVC9B-4J6C9-T83GX"2⤵PID:4584
-
-
C:\Windows\system32\msg.exemsg "Admin" "Windows has been successfully activated, please restart your PC to finish the activation."2⤵PID:2444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Install-Code.bat" "1⤵PID:2372
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:5108
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:4180
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵PID:4412
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Engine-Code.bat" "1⤵PID:3736
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:3964
-
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:4904
-
-
C:\Windows\system32\tree.comtree C:\Users\Admin /F2⤵PID:2496
-
-
C:\Windows\system32\tree.comtree /F2⤵PID:4704
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:4128
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2452
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:3524
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2544
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 12⤵
- Delays execution with timeout.exe
PID:2908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Install-Code.bat" "1⤵PID:1852
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:3624
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:1572
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 22⤵
- Delays execution with timeout.exe
PID:3664
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2700
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:1972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9841246f8,0x7ff984124708,0x7ff9841247182⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2460 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,17902439753929884449,9132707959490798386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1776
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /P:5250182⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /P:5250183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ /P:5250184⤵PID:2964
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Script_Run.bat" "1⤵PID:2700
-
C:\Windows\system32\choice.exechoice /C:yas /N2⤵PID:3620
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Script_Run.bat"1⤵PID:2348
-
C:\Windows\system32\choice.exechoice /C:yas /N2⤵PID:3836
-
-
C:\Windows\system32\bcdedit.exebcdedit /set hypervisorlaunchtype off2⤵
- Modifies boot configuration data using bcdedit
PID:3500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -noprofile -executionpolicy bypass -file "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\\RemoveSecHealthApp.ps1"2⤵
- Command and Scripting Interpreter: PowerShell
PID:4356
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"4⤵
- Modifies data under HKEY_USERS
PID:4380 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"5⤵
- Modifies data under HKEY_USERS
- Runs .reg file with regedit
PID:3008
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"4⤵PID:4400
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"5⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies firewall policy service
- Windows security bypass
- Modifies data under HKEY_USERS
- Modifies registry class
- Runs .reg file with regedit
PID:2824
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"4⤵
- Modifies data under HKEY_USERS
PID:2096 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"5⤵
- Modifies firewall policy service
- Runs .reg file with regedit
PID:4248
-
-
-
-
-
C:\Windows\regedit.exeregedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"2⤵
- Runs .reg file with regedit
PID:3068
-
-
C:\Windows\regedit.exeregedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Modifies registry class
- Runs .reg file with regedit
PID:4760
-
-
C:\Windows\regedit.exeregedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"2⤵
- Modifies firewall policy service
- Runs .reg file with regedit
PID:548
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3636 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"4⤵
- Modifies data under HKEY_USERS
PID:3616 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"5⤵
- Modifies firewall policy service
- UAC bypass
- Modify Registry: Disable Windows Driver Blocklist
- Boot or Logon Autostart Execution: LSASS Driver
- Modifies data under HKEY_USERS
- Modifies registry class
- Runs .reg file with regedit
PID:5112
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""4⤵PID:3736
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""5⤵PID:548
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""4⤵
- Modifies data under HKEY_USERS
PID:4400 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""5⤵PID:4976
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""4⤵
- Modifies data under HKEY_USERS
PID:3624 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""5⤵PID:5104
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Script_Run.bat"1⤵PID:1456
-
C:\Windows\system32\choice.exechoice /C:yas /N2⤵PID:3092
-
-
C:\Windows\system32\bcdedit.exebcdedit /set hypervisorlaunchtype off2⤵
- Modifies boot configuration data using bcdedit
PID:1100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -noprofile -executionpolicy bypass -file "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\\RemoveSecHealthApp.ps1"2⤵
- Command and Scripting Interpreter: PowerShell
PID:3756
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"3⤵PID:4604
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"4⤵
- Modifies data under HKEY_USERS
PID:4768 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"5⤵
- Modifies data under HKEY_USERS
- Runs .reg file with regedit
PID:3844
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"2⤵PID:468
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"3⤵PID:2452
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"4⤵PID:5032
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"5⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies firewall policy service
- Windows security bypass
- Modifies data under HKEY_USERS
- Runs .reg file with regedit
PID:2424
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"2⤵PID:912
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"3⤵PID:4028
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"4⤵
- Modifies data under HKEY_USERS
PID:4300 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"5⤵
- Modifies firewall policy service
- Runs .reg file with regedit
PID:1592
-
-
-
-
-
C:\Windows\regedit.exeregedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\NomoreDelayandTimeouts.reg"2⤵
- Runs .reg file with regedit
PID:3848
-
-
C:\Windows\regedit.exeregedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\Output.reg"2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies firewall policy service
- Windows security bypass
- Runs .reg file with regedit
PID:1232
-
-
C:\Windows\regedit.exeregedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_defender\RemoveShellAssociation.reg"2⤵
- Modifies firewall policy service
- Runs .reg file with regedit
PID:2268
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun.exe regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"2⤵PID:3632
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"3⤵PID:1852
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ regedit.exe /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"4⤵PID:1216
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\Remove_SecurityComp\Remove_SecurityComp.reg"5⤵
- Modifies firewall policy service
- UAC bypass
- Modify Registry: Disable Windows Driver Blocklist
- Boot or Logon Autostart Execution: LSASS Driver
- Modifies data under HKEY_USERS
- Runs .reg file with regedit
PID:4464
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""2⤵PID:4008
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""3⤵PID:3980
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""4⤵
- Modifies data under HKEY_USERS
PID:5000 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityAndMaintenance_Error.png""5⤵PID:4284
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""2⤵PID:2840
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""3⤵PID:708
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""4⤵
- Modifies data under HKEY_USERS
PID:2700 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityAndMaintenance.png""5⤵PID:3888
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""2⤵PID:3024
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""3⤵PID:3268
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""4⤵PID:1636
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthSystray.exe""5⤵PID:2816
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthService.exe""2⤵PID:3824
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthService.exe""3⤵PID:4908
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthService.exe""4⤵
- Modifies data under HKEY_USERS
PID:4356 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthService.exe""5⤵PID:3748
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthHost.exe""2⤵PID:5004
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthHost.exe""3⤵PID:2020
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthHost.exe""4⤵
- Modifies data under HKEY_USERS
PID:4884 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthHost.exe""5⤵PID:3916
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\drivers\SgrmAgent.sys""2⤵PID:4632
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\drivers\SgrmAgent.sys""3⤵PID:3500
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\drivers\SgrmAgent.sys""4⤵PID:4332
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\drivers\SgrmAgent.sys""5⤵PID:2376
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\drivers\WdDevFlt.sys""2⤵PID:5076
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\drivers\WdDevFlt.sys""3⤵PID:3540
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\drivers\WdDevFlt.sys""4⤵
- Modifies data under HKEY_USERS
PID:3060 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\drivers\WdDevFlt.sys""5⤵PID:672
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\drivers\WdBoot.sys""2⤵PID:4360
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\drivers\WdBoot.sys""3⤵PID:468
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\drivers\WdBoot.sys""4⤵PID:1232
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\drivers\WdBoot.sys""5⤵PID:5000
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\drivers\WdFilter.sys""2⤵PID:3680
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\drivers\WdFilter.sys""3⤵PID:4768
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\drivers\WdFilter.sys""4⤵
- Modifies data under HKEY_USERS
PID:4752 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\drivers\WdFilter.sys""5⤵PID:4248
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\wscsvc.dll""2⤵PID:4880
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\wscsvc.dll""3⤵PID:5112
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\wscsvc.dll""4⤵PID:1052
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\wscsvc.dll""5⤵PID:4400
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\drivers\WdNisDrv.sys""2⤵PID:4404
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\drivers\WdNisDrv.sys""3⤵PID:2908
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\drivers\WdNisDrv.sys""4⤵
- Modifies data under HKEY_USERS
PID:4460 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\drivers\WdNisDrv.sys""5⤵PID:1048
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\wscsvc.dll""2⤵PID:2992
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\wscsvc.dll""3⤵PID:3212
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\wscsvc.dll""4⤵
- Modifies data under HKEY_USERS
PID:2424 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\wscsvc.dll""5⤵PID:3632
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\wscproxystub.dll""2⤵PID:2768
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\wscproxystub.dll""3⤵PID:2536
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\wscproxystub.dll""4⤵
- Modifies data under HKEY_USERS
PID:2888 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\wscproxystub.dll""5⤵PID:2964
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\wscisvif.dll""2⤵PID:1584
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\wscisvif.dll""3⤵PID:1312
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\wscisvif.dll""4⤵PID:1388
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\wscisvif.dll""5⤵PID:372
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthProxyStub.dll""2⤵PID:3952
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthProxyStub.dll""3⤵PID:4948
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthProxyStub.dll""4⤵
- Modifies data under HKEY_USERS
PID:3368 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthProxyStub.dll""5⤵PID:456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1592
-
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\smartscreen.dll""2⤵PID:3056
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\smartscreen.dll""3⤵PID:3412
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\smartscreen.dll""4⤵
- Modifies data under HKEY_USERS
PID:2444 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\smartscreen.dll""5⤵PID:4248
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreen.dll""2⤵PID:3024
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreen.dll""3⤵PID:4816
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreen.dll""4⤵PID:4768
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\SysWOW64\smartscreen.dll""5⤵PID:592
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\smartscreen.exe""2⤵PID:3848
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\smartscreen.exe""3⤵PID:5068
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\smartscreen.exe""4⤵
- Modifies data under HKEY_USERS
PID:2952 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\smartscreen.exe""5⤵PID:3748
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreen.exe""2⤵PID:4992
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreen.exe""3⤵PID:5076
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreen.exe""4⤵PID:1400
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\SysWOW64\smartscreen.exe""5⤵PID:912
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\DWWIN.EXE""2⤵PID:4872
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\DWWIN.EXE""3⤵PID:3760
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\DWWIN.EXE""4⤵PID:396
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\DWWIN.EXE""5⤵PID:1544
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreenps.dll""2⤵PID:964
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreenps.dll""3⤵PID:3668
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\SysWOW64\smartscreenps.dll""4⤵
- Modifies data under HKEY_USERS
PID:656 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\SysWOW64\smartscreenps.dll""5⤵PID:1380
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\smartscreenps.dll""2⤵PID:4624
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\smartscreenps.dll""3⤵PID:2300
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\smartscreenps.dll""4⤵
- Modifies data under HKEY_USERS
PID:2604 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\smartscreenps.dll""5⤵PID:2112
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthCore.dll""2⤵PID:1152
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthCore.dll""3⤵PID:2356
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthCore.dll""4⤵
- Modifies data under HKEY_USERS
PID:2200 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthCore.dll""5⤵PID:3156
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSsoUdk.dll""2⤵PID:1980
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSsoUdk.dll""3⤵PID:3492
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthSsoUdk.dll""4⤵PID:1100
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthSsoUdk.dll""5⤵PID:4752
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthUdk.dll""2⤵PID:4416
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthUdk.dll""3⤵PID:3060
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthUdk.dll""4⤵PID:2312
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthUdk.dll""5⤵PID:4884
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthAgent.dll""2⤵PID:1096
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthAgent.dll""3⤵PID:4880
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\SecurityHealthAgent.dll""4⤵
- Modifies data under HKEY_USERS
PID:4996 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\SecurityHealthAgent.dll""5⤵PID:2608
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\wscapi.dll""2⤵PID:2124
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\wscapi.dll""3⤵PID:5064
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\wscapi.dll""4⤵PID:3924
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\wscapi.dll""5⤵PID:3736
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\wscadminui.exe""2⤵PID:1020
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\wscadminui.exe""3⤵PID:4416
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\wscadminui.exe""4⤵
- Modifies data under HKEY_USERS
PID:2024 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\wscadminui.exe""5⤵PID:232
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\SysWOW64\GameBarPresenceWriter.exe""2⤵PID:2388
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\SysWOW64\GameBarPresenceWriter.exe""3⤵PID:1668
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\SysWOW64\GameBarPresenceWriter.exe""4⤵PID:3624
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\SysWOW64\GameBarPresenceWriter.exe""5⤵PID:2856
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\System32\GameBarPresenceWriter.exe""2⤵PID:1152
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\System32\GameBarPresenceWriter.exe""3⤵PID:644
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\System32\GameBarPresenceWriter.exe""4⤵
- Modifies data under HKEY_USERS
PID:3836 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\System32\GameBarPresenceWriter.exe""5⤵PID:1248
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\SysWOW64\DeviceCensus.exe""2⤵PID:2268
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\SysWOW64\DeviceCensus.exe""3⤵PID:3056
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\SysWOW64\DeviceCensus.exe""4⤵
- Modifies data under HKEY_USERS
PID:1776 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\SysWOW64\DeviceCensus.exe""5⤵PID:1048
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\SysWOW64\CompatTelRunner.exe""2⤵PID:1852
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\SysWOW64\CompatTelRunner.exe""3⤵PID:4100
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\SysWOW64\CompatTelRunner.exe""4⤵
- Modifies data under HKEY_USERS
PID:2256 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\SysWOW64\CompatTelRunner.exe""5⤵PID:2444
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\system32\drivers\msseccore.sys""2⤵PID:3824
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\system32\drivers\msseccore.sys""3⤵PID:3408
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\system32\drivers\msseccore.sys""4⤵PID:2452
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\system32\drivers\msseccore.sys""5⤵PID:4996
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\system32\drivers\MsSecFltWfp.sys""2⤵PID:4416
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\system32\drivers\MsSecFltWfp.sys""3⤵PID:1840
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\system32\drivers\MsSecFltWfp.sys""4⤵
- Modifies data under HKEY_USERS
PID:3956 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\system32\drivers\MsSecFltWfp.sys""5⤵PID:3328
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c del /f ""C:\Windows\system32\drivers\MsSecFlt.sys""2⤵PID:3888
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c del /f ""C:\Windows\system32\drivers\MsSecFlt.sys""3⤵PID:3940
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c del /f ""C:\Windows\system32\drivers\MsSecFlt.sys""4⤵PID:4284
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del /f ""C:\Windows\system32\drivers\MsSecFlt.sys""5⤵PID:1052
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy" /s /q2⤵PID:656
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy" /s /q3⤵PID:5032
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy" /s /q4⤵
- Modifies data under HKEY_USERS
PID:3456 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\SystemApps\Microsoft.Windows.AppRep.ChxApp_cw5n1h2txyewy" /s /q5⤵PID:4088
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Defender" /s /q2⤵PID:4976
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Defender" /s /q3⤵PID:4172
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Defender" /s /q4⤵PID:1548
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\ProgramData\Microsoft\Windows Defender" /s /q5⤵PID:2196
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3748
-
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection" /s /q2⤵PID:2444
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection" /s /q3⤵PID:2348
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection" /s /q4⤵PID:2992
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection" /s /q5⤵PID:1936
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Program Files (x86)\Windows Defender Advanced Threat Protection" /s /q2⤵PID:4624
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Program Files (x86)\Windows Defender Advanced Threat Protection" /s /q3⤵PID:3356
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Program Files (x86)\Windows Defender Advanced Threat Protection" /s /q4⤵
- Modifies data under HKEY_USERS
PID:2528 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Program Files (x86)\Windows Defender Advanced Threat Protection" /s /q5⤵PID:4984
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Program Files\Windows Defender Advanced Threat Protection" /s /q2⤵PID:4464
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Program Files\Windows Defender Advanced Threat Protection" /s /q3⤵PID:3960
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Program Files\Windows Defender Advanced Threat Protection" /s /q4⤵
- Modifies data under HKEY_USERS
PID:3548 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Program Files\Windows Defender Advanced Threat Protection" /s /q5⤵PID:3540
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Security Health" /s /q2⤵PID:232
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Security Health" /s /q3⤵PID:4488
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\ProgramData\Microsoft\Windows Security Health" /s /q4⤵
- Modifies data under HKEY_USERS
PID:208 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\ProgramData\Microsoft\Windows Security Health" /s /q5⤵PID:4116
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\ProgramData\Microsoft\Storage Health" /s /q2⤵PID:5064
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\ProgramData\Microsoft\Storage Health" /s /q3⤵PID:4604
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\ProgramData\Microsoft\Storage Health" /s /q4⤵PID:2624
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\ProgramData\Microsoft\Storage Health" /s /q5⤵PID:3980
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\WINDOWS\System32\drivers\wd" /s /q2⤵PID:4172
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\WINDOWS\System32\drivers\wd" /s /q3⤵PID:2756
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\WINDOWS\System32\drivers\wd" /s /q4⤵PID:3888
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\WINDOWS\System32\drivers\wd" /s /q5⤵PID:1380
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Program Files (x86)\Windows Defender" /s /q2⤵PID:2024
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Program Files (x86)\Windows Defender" /s /q3⤵PID:2972
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Program Files (x86)\Windows Defender" /s /q4⤵PID:3068
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Program Files (x86)\Windows Defender" /s /q5⤵PID:1192
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Program Files\Windows Defender" /s /q2⤵PID:1668
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Program Files\Windows Defender" /s /q3⤵PID:1600
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Program Files\Windows Defender" /s /q4⤵PID:3840
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Program Files\Windows Defender" /s /q5⤵PID:2768
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\SecurityHealth" /s /q2⤵PID:2424
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\SecurityHealth" /s /q3⤵PID:4488
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\SecurityHealth" /s /q4⤵PID:1100
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\SecurityHealth" /s /q5⤵PID:1084
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\WebThreatDefSvc" /s /q2⤵PID:1368
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\WebThreatDefSvc" /s /q3⤵PID:4028
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\WebThreatDefSvc" /s /q4⤵PID:3188
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\WebThreatDefSvc" /s /q5⤵PID:1864
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\Sgrm" /s /q2⤵PID:4404
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\Sgrm" /s /q3⤵PID:2756
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\Sgrm" /s /q4⤵PID:3824
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\Sgrm" /s /q5⤵PID:1752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4624
-
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\Containers\WindowsDefenderApplicationGuard.wim" /s /q2⤵PID:3940
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\Containers\WindowsDefenderApplicationGuard.wim" /s /q3⤵PID:2816
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\Containers\WindowsDefenderApplicationGuard.wim" /s /q4⤵PID:2280
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\Containers\WindowsDefenderApplicationGuard.wim" /s /q5⤵PID:3932
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q2⤵PID:3952
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q3⤵PID:3092
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q4⤵PID:1020
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q5⤵PID:3964
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:2964
-
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q2⤵PID:2528
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q3⤵PID:372
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q4⤵PID:720
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DefenderPerformance" /s /q5⤵PID:3632
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Defender" /s /q2⤵PID:4552
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Defender" /s /q3⤵PID:3548
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Defender" /s /q4⤵PID:4464
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Defender" /s /q5⤵PID:1852
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\Tasks_Migrated\Microsoft\Windows\Windows Defender" /s /q2⤵PID:3068
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\Tasks_Migrated\Microsoft\Windows\Windows Defender" /s /q3⤵PID:4880
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\Tasks_Migrated\Microsoft\Windows\Windows Defender" /s /q4⤵PID:2840
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\Tasks_Migrated\Microsoft\Windows\Windows Defender" /s /q5⤵PID:1216
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\Tasks\Microsoft\Windows\Windows Defender" /s /q2⤵PID:3840
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\Tasks\Microsoft\Windows\Windows Defender" /s /q3⤵PID:4984
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\Tasks\Microsoft\Windows\Windows Defender" /s /q4⤵PID:2260
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\Tasks\Microsoft\Windows\Windows Defender" /s /q5⤵PID:3624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:232
-
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Defender" /s /q2⤵PID:1940
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Defender" /s /q3⤵PID:4544
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Defender" /s /q4⤵PID:4120
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Defender" /s /q5⤵PID:1048
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\System32\HealthAttestationClient" /s /q2⤵PID:4004
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\System32\HealthAttestationClient" /s /q3⤵PID:3068
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\System32\HealthAttestationClient" /s /q4⤵PID:2940
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\System32\HealthAttestationClient" /s /q5⤵PID:4832
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\GameBarPresenceWriter" /s /q2⤵PID:2888
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\GameBarPresenceWriter" /s /q3⤵PID:2020
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\GameBarPresenceWriter" /s /q4⤵PID:4872
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\GameBarPresenceWriter" /s /q5⤵PID:836
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\bcastdvr" /s /q2⤵PID:4924
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\bcastdvr" /s /q3⤵PID:1340
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\bcastdvr" /s /q4⤵PID:1084
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\bcastdvr" /s /q5⤵PID:4548
-
-
-
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exePowerRun cmd.exe /c rmdir "C:\Windows\Containers\serviced\WindowsDefenderApplicationGuard.wim" /s /q2⤵PID:4380
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" cmd.exe /c rmdir "C:\Windows\Containers\serviced\WindowsDefenderApplicationGuard.wim" /s /q3⤵PID:5052
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ cmd.exe /c rmdir "C:\Windows\Containers\serviced\WindowsDefenderApplicationGuard.wim" /s /q4⤵PID:5000
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c rmdir "C:\Windows\Containers\serviced\WindowsDefenderApplicationGuard.wim" /s /q5⤵PID:1312
-
-
-
-
-
C:\Windows\system32\timeout.exetimeout 32⤵
- Delays execution with timeout.exe
PID:4576
-
-
C:\Windows\system32\shutdown.exeshutdown /r /f /t 102⤵PID:3988
-
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"1⤵PID:4972
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /P:18355562⤵PID:212
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /P:18355563⤵PID:1120
-
C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe"C:\Users\Admin\Downloads\windows-defender-remover-main\windows-defender-remover-main\PowerRun.exe" /TI/ /P:18355564⤵PID:2856
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k ver & echo Hi world!5⤵PID:3068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"5⤵PID:4880
-
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3f02055 /state1:0x41c64e6d1⤵PID:1192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2LSASS Driver
1Print Processors
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2LSASS Driver
1Print Processors
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Registry
6Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
2System Information Discovery
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d56865450c7068fca012b552e65a7fb1
SHA1c23354d51e1e3f2340b42f7520732df92e0e5727
SHA2564b1620e825d28b8f253a7ffad8f680fc32249c4a5f7499d205cb7ae6c3945572
SHA5124c08c4f7fcc0168c58040ab2a0710ad1ab0f1a358e2e6083fc3903ca8989b7d7e5f76aefc6ce0e9281a31ce851f1650e2f3418227702a4c20f4513205c2a861e
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5b3e82ef7101d74c3994309c0c51541d5
SHA12861715bf4e2cd034b923595785f536ae932efa6
SHA2563dacff73fc83638b94fffab7519727faee50e6a9ef6587e2d07d364ab773336c
SHA512435a4b4257d5a700ff37c75fcf54800c20a3792a1008b813976979e98ef2356bd1def6abf8d0581416f00926c4ef30578f384e8e56680b655933f089960565fc
-
Filesize
152B
MD585bb61c770ab343cf25e05e99e442eb0
SHA18e72d66eb53ccb9f45358e7cd77f51fc6c4f506e
SHA2561712838a6b7ffc53d8e596b689f32bdb8911ab4e613a52917cd95e704cca88d4
SHA51230ccf8d91dc9968aeb5095507f56b05f410bddce2bc6fc6e004141b20c029531aa61a0e032163fd0178bef4d1a5657dd58219f932eeaebe25f794d604f29556e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73aca2f9-5d34-481f-b444-da21ecb03c8a.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
44KB
MD5da5a55abdca315a84c9d9c0766da9482
SHA15d9d4219838d35449305ffe00efa0f157b934541
SHA25663a66012d386cb86e3b00a66e925ce63a727547fd3a6632deb500f8e84d7934d
SHA51273443e560ef532329a09f8135e16943103cfccde68e188635a2fad1b84d735900ad63583ba2d4c0f8da3fc541078926e08698e70e5c7282bec72d35dfb38767b
-
Filesize
264KB
MD5587ca9ad368e9f4cf5ecb612fdacdbed
SHA12a3015025793dfecb4a4fa927ca5ba7ec0d9aab6
SHA2569974aacc89fe7699013f0e0b6b0b5b7dd66f26bee802eb80416b26a2d805ab25
SHA5127e00e3e5e01ada341fa95fb97546929702385f514405618740badd8b36da7c62a5f0efc1d6c3725738b483fafa96eb8a0fb39b77128bff5653a00cb28882d9d2
-
Filesize
1.0MB
MD5e4da964f0defac1a91c725ced9dbdcd0
SHA1af58616d4cec9fb7a5bc6ce93f6a701b03be7d5b
SHA25661dd0460181a6851432bf67dec3fa1ded59a7fedad648929659209c621d46df9
SHA51216ef18174b36301bdd1d0457ece9535dd00574a2d4f87577f421e16629a5af97c2b37d2a6c71003291eef81e59e50f8b58bf7472855b7fb8b745366c4e7106b1
-
Filesize
4.0MB
MD5be0599747b39f49c71073f33f8d18394
SHA10a30c2aee9ba65ab18d89206fa3d7dd204bfdc0f
SHA2564f877ac0e7dbcfcf1e39e8ca72b1224e7e2928b46dd7a3903c019a71b989dca0
SHA51208a8957e5baa3d8d5d75bc0a52f860f8f7f91eb0f4d4861db077549d679dd002f9925e5c38f6916b1c6a2490d232311bd2e4a09f6d61ef45ea4de3d51454a240
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD561bc54df45f04da279a4487591982aab
SHA11b13a9a3e08adf1fb2c8841cad01ede42eb01525
SHA256d9e7f39062d1f3fd254467a2fa9588b4aeed9c7fe05f347af3dd5cc62d30c5ec
SHA512c251b2c5effeaec56bde367b7e1883675eab5dbb0f1c00b4d8918df39a28292d589111f1752b6609b24a15128d97e9b11d9ed1cf9184c16bf92bd7dfd319b0a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5539dea858e9f3e343fbf588958d0da11
SHA12f4aba95e20b1576e4253ffd8b212f4670dda545
SHA256d4a0b4cf679209d6aadad4a03297a3ec5fa7bded5001ede7026e7b8ac6477aae
SHA512de3619e8cd0d9916e0fc66b87f73d5a2832f458d1d73fa645b3c6dd738f56c1d23fc0042a9d65e39d5a93f81bb99e0046f26a5d248cd08f1d42545e2496ca58b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5712d07bff646b9ea6381021c3dc73e3e
SHA1149ada63ff7285489011f7d3f2225d9b69e3b113
SHA2560fc90d36d4fba8e8a6ad396c9217b585c789a0a04f519e4551f85d9f6bde35bc
SHA5125b91068d81e76d107f8b2079da54cad1010e8990203d77aaa98ce6cb29c907e4ff0829ad8ef87381032d2806c6cf6a63a83c890e7950726d8dd1ddedadb58b80
-
Filesize
20KB
MD545bcf6d2a901530bdf92595f52fb37ae
SHA13c0da65c9835c2a9379dbdc2b2dfa18ed6cc7904
SHA2560163c844f8f733cffb2d6543db4fc72537ac86a44fd4d10d60c89475d5adeb93
SHA51202cd993f3a2cad54e91f645587f6cc7e9ec0e9c267c35d02453a2da3b4b6cc0488d5f85744db913f83a71714aad92ffabfe1ac7a61b87ba1dc3e6c275974c706
-
Filesize
319B
MD55c36545b23167e8a05dd983841f72909
SHA1ce7308432ec677466728898b2e0ebd53d8ce58cf
SHA2563ac03a8071c33a1ea5a4f201a1029c42452512ae285614fce1e4bab8e7600641
SHA512fec8d32625d7588553c8c1000bbcc521c42994df267b872a7539ba15fb267dd3a84f3b84970b7b0cce5336824c30b5eb98b23b740e13019837858f488d6be1ba
-
Filesize
28KB
MD537fba8c553fe554b1668d4908fafdb55
SHA1f553b43fd35634d4374ef12f8f88888f98d15043
SHA256aefd4df650147d6cc90c7b4c92fca638182e25c61195ad49bc376da0131199b6
SHA512b2a2c6b7b2c4247c0b7c4940d464babb44c0090b57f0a514b55986f4564717c86d741cac1df85a10885e92501d9f463cd2606ae75ea9978e249cc6b5f4f2d366
-
Filesize
264KB
MD5bc383b9f3f08738155b0786e58d0a895
SHA1d0206a734980aebb52f6b83553109204f5fe38a5
SHA25653eaf60b44f2ffa2bacc13417ba7fea3aca4f176e16f9aa6b536f5919971620a
SHA512ada19c9619fe3e97da0e900bc32dc9cae8b87c6899d90ddc6dc4490020e960340c2ec84f342e23405556d0bb078acb7bf1b6fe31bfc5b12b277f833f832751b1
-
Filesize
124KB
MD5dfe7b729b18c4f9fc40a485acbfe77de
SHA16fe00031186f780b7697fc8e1e9648de681818f3
SHA256f9ad7a00ee9d5761cc52e4b1a4066f009c56d028c74d9f05e36e68646ba79579
SHA5129dbe7aeb9edfce22767c76809a69ebde650c63cfece859d45823ca42d5354d075a036f029bd7ebae4fdaaf208c7b6d5f61b9ec1730e34c36a6f2072c22942909
-
Filesize
4KB
MD5047c83f93b87bbefc980e3cd5d00fc16
SHA126e6415d9f77ff30595b0f323c7e48851963305c
SHA2568cd46b357b5d28be86b2eb123b761611e3fe759ffa81bcec00e2c14582df1323
SHA512ec9e8ad9b96bb48884c84fa63bfe2f75bedff5df11bd323eeced574a84137d04e6cbcff36cb82b9f52bc242b23aedd06e2e36a222b060fc8d5aadc0b317678f7
-
Filesize
12KB
MD506a0d961ef952e51a8de4ff2d695ca87
SHA1a0b946a51c97f8095f22250f1548a150c43cd25e
SHA2562bbf8a43c73044fdf138009625158ec468927a4ff495fdba87f231b6d1addf19
SHA512f9ee41e4d17df33f4026078378f393e231e31edfd9cdb601b2b72dae30fc50a24cf749041a59f5ec0e15c8e10803add04ab0642d223eb342cd13f3e1daae544c
-
Filesize
334B
MD5374f8620c83e6b1b0c5550ce87984534
SHA1db979510ad4d41fa64297ba2c921fe9ed579610f
SHA2567e27b4d8752fde0fcadc66fc3b2a93083130e0482740bcc30b4f10765268909d
SHA5124143bd2353895b0118c8cdcc2fa95ca803bd7a703eed7efb99a739bc6e7da50609979ce6fb422ead95312becfd413fba0d1c66d4f44a028c88d12f1a37d730c3
-
Filesize
1KB
MD518121162975db9d9cf8419a80993cc36
SHA1e5fc2693575f4f5d58584930db0a83ba5331e32d
SHA2567222368e0475cb20fc325082b448e5f54790a6b16de4b2e26915563e64e49bcb
SHA512d467f1c078812eb126f00078a34f3ad2a06b22d569d17301874fc2290f691b435295789c292a5776c988971be365d0eba04ea2fa04816f6572ca1d1c256cbfff
-
Filesize
1KB
MD5336f65c3118e81220b5ad433f50ea015
SHA1f6061a5e36ca97fa5719d81458760128e9b57e02
SHA2566f6b2a0b7b560e1d23a50145e317d42d1774fbe064a928e27f3892d68da17cb7
SHA5124bc48650fce8057f8fff8f06b803eafed3907a0bdec3902bb18db7e6997df8444ec98beee71e3b2a43131638feaebd0f308cde1c3e74c741894b6ee693f8133c
-
Filesize
934B
MD5281fcd640c51fa55fb3d72e600c292b1
SHA14b88788eb1accda5c1d64917d4381e5c1c679e32
SHA25683a4e446de5b4a1770cd26120debddc54a5f284b943771e9f12bfd267263f371
SHA5124b3b43f0ac8b87bab97fa33d12068350cba68c6ba5560a302000ccccb5d0a6ea41b49567a33a2dc3b82cef51e76c2e93e139f9d88b4528f072e7fbc23299d7ec
-
Filesize
7KB
MD5c7d87f39381332d0cffaf9f893bca4e5
SHA1a288e5d9f33b11c06af908cf7490eb314d56a85d
SHA2560cf19785d15e50092ddbff8a73e1cedadebb2338eedb0278c86a6b6534400b95
SHA512a8bcb5bead3d2176b3afde394e3d86380c5fcf5b48b9f30ad3bd3f11f1a07cf74c19b943e6a529248c6fb2f9c43617ac42426dd5b0f20189c56bd010c5f9bdc5
-
Filesize
7KB
MD5efe72bf90a2961ab6741b9ddb5f9ffb8
SHA124d38ee5cfee38f6795bb8a8cb8d242326e31f34
SHA256027c7078932892cda4207b21f61180739d5c3973fc02338599e0a437b847f4cd
SHA51264331a734d87bc27ea8ebf19cce4a2e8774364fc4fd915c1ee7162257581b12a7541e862976c4cc0baabfecc71a75eeb97f8a404ec084c8501cbc50880ecf28b
-
Filesize
7KB
MD5452158599b1136e0ab19c9993cae222e
SHA1a017d87aa217b5b8ce6dfa1ff3c1aea7e333de30
SHA2563909356a9b4dfd99f7d1d525069f8a60bafaa99ee26e06da69373bc0e0a90a06
SHA512d4f04abee08e3769a1062966a5965820514c52fd1836ee01d333e184f89865f7d71d6a6df9c55ea9fabd80dee827248756c786abbd8eec81958825e497137af1
-
Filesize
7KB
MD5ac2627a92dc1a5f797940df9a23baf40
SHA17d2c29634f2672c6e49e309b4c0f694ae2b93413
SHA2565b3825d93aca0ae069f838d6772deb5717b1c777ebbf6ef0fe93ce389fc192d3
SHA512d832d737c57f01ca1c220be8646670d23d2711e0a7d22fbc87291db06f5537a55c6d328a02befbd0eef293b4d8cd19d40ade7e20f4feec8f22d0d39ddcf52f77
-
Filesize
7KB
MD50fba043811eb1c3843b30a982ae9f6e2
SHA1e31bc86c14d8fc3c5bfa282366abf874282c9ad2
SHA25626cd1f9058769cafcd0bff0dacaee4a2631046bf885fc8643bcc1a4fcf0dd2c0
SHA51209580ad43e8bedb9dffeeefb8fd72dd3c2bb971c58e877736efa75fd1e1b625334990b71b4ad2754c1d316d9e5272ad2ee9e6c19196198a4d2cadd89d96d5177
-
Filesize
5KB
MD5f435f8f5e6b46a1271936e8745014472
SHA1467f12e42829ff831e7c0da86888bc33671ea8fe
SHA25620a2edbe66bf0971ef9207d2e122e136b997d5484716c1e4b7c4e0b105f18537
SHA51215b9fff129af78d34f8a27390f9b1a899df617ebe919ecb184fa67bb47c66e18349ae7f150da34f5c84d96cf98d8ca4309d438793d075afcf31996c03c380f94
-
Filesize
7KB
MD5e7b4d20bb4b13240d291a81028b04314
SHA15bf90571d1f93fdae07ce97052fe15aa32b4ae98
SHA256979b2a3fbfce3afd3732ffa158d1270a28a7427bd6b681f00485ecb87e45b241
SHA51258338da92132ba64cbb385b4742a47096ccd37ff721c08ea6639b16bd02f8c3cae517795a86a4bf6bc29a72b6ab47ae39239c9a800b32224324c574569a0271f
-
Filesize
7KB
MD587649f9ca4d8eff1455140258e457280
SHA17532c243f89535a14d8103ff7d75f4c849dd4aaf
SHA25629a17c21642aaa60520b8548db337372207d97bb7953b475802d5cde575aa418
SHA512feea9ea172e4050dcfca2c5a44c79e1bc83610990f066c78ac161fbbb7ea0596b794c78b9b8b4eca2ecd007579a2436c7ae5b12f26d0beabff0a9d58953254cc
-
Filesize
7KB
MD591d6f075771c6f13cf2f91251ead2b0c
SHA1d216bdeb0bf8018c48d7008cf94df94de41dc3ed
SHA256589cfd3f3157eaa5d75daaf9c9ff55991c01e55e98e348698f216814aaf6fd0b
SHA5129b9314c5ce4252fae25188351dcae3204f98928b2f67dd94760473aa5b4d2a66efd176b5fc91b6ad12c94e8ad44d6c392f36d75d3f62812d2818dfde327c1240
-
Filesize
7KB
MD5d5e6185fe11a60bcb3e7e9f2558b3232
SHA1f35b7b231ff6fc8315e02421cdf5f665c0cc7ade
SHA2561d848a7991f573b67ec837cb392e7814673b78abee9743f8ff07af0c0950e567
SHA5126b795424fb5d8118295cee7a29f38439a8f2dca6e4749ea06306b5c736025fcbd9a67b29d07f25332baf327d126f84258b9f7b58aa5e94640ca418742a1ae254
-
Filesize
7KB
MD5b3d27f0f7e0383bdb34f7e3f9135d6a2
SHA1f4822d1745e68b8cdb7fc5c7000082f36e53e5ec
SHA256d2fc0a0eeb153271644d025e50bbefad9f97d58ce4cfd10d50bf091546dd8e6d
SHA512222fe56106836d1881dcb6edd90cb6617bdf960c300a494f2c3194888b7b0b1c5cc6d6ecf873e7cb38ab66d2118099d68d3622753c9ac7d7cdaf78ef1832d2fe
-
Filesize
6KB
MD5aecd3f66ce24ad12f7c26825d5be0ce9
SHA117da5f867ee6957b8b6a364ef94eb061ceaf3ac0
SHA25677d02c38d453a35853bd16a27635934f1a7018245ba24a6cfd7d85841d233876
SHA5122527872b38a59557d7391a8be0f5c2f0369f69c60587e2e7f95e8a5cbab44fe921c58af819b30fd92ca898a5ada67ca563d4f126da3da4dbcaa4737012254914
-
Filesize
6KB
MD562430284138dd845a08d93ca8bab33ca
SHA1d8df7bfffff6c71c441e2086e47de5d350790468
SHA25633c40159d9ac4bbc854a00c0ae846733ba9c61cfeb621edb78a7a0162823a546
SHA512a747d4cab16b8b810d0b6f57a8e5e6746a53a371610195f65173991e993b273eb29da799228feba13029d47b3884b78790dfe3dd61495130aa950f0f924e7d21
-
Filesize
36KB
MD55160f70cc116ed2443e78ede38e5db38
SHA14639f412dde35f3c61b2bd4732210305f03634fd
SHA2566b4a915166a91cc62646b3206840ee12735c0dab211109c94d2ee388af528c17
SHA5122319819f91df2a62a8f93de73b456e530ca1f7b0fdce5d2687c9966cb0683c3ac3a206ae136f38fdaadd96f4be6fa786aa0bc9225caca04555781776475f289e
-
Filesize
979B
MD51a06b1be32807b4600e75a080e767cd8
SHA1dc6f504f91748a80381b5e9ff2c254ec225a7a1f
SHA256274736683d7bb47c819e773477668c89400a3712bfbc519f86373516bbd86bd3
SHA5124075dc0ed769fa8cd3451a3c84f6c5ce1ef2ee02a33ff583d5b248ec01c40058b8219b1ad2ca543e09744e68ca97fd3715074f2421782b4745c16ac5b3db528f
-
Filesize
322B
MD58e721d44a72504ab79cb70a86fe6919d
SHA14317e8d40f73115d610cac770fe1e242428354b4
SHA256dd2154ffbaa2e413b41b8bf011a91e07dfee4807a5668a08c922d07adce60767
SHA512db172b3e9a1edb366ea1a47e1f0ccba134974877cdc4e469cfef71207137edd0e8758a37ccdf95a657bce2c27fed54f803574041d52daddbb08dcdf6b2409ad2
-
Filesize
16KB
MD59ad0db98516f3d5656f1624d6f6e9418
SHA140d8db966abeaca8953168d4b6867315c4d9516a
SHA2568911ff62313e8dfb847f7252a1e33a0cfbb2c08748fe7794c8d3a9a8d0bfd22c
SHA51253e4ad401595b7173e89aa1478acdec491541038f20cb97369337b76f6552e2da70b505d3c942d08677f6128d6429c2a5c0ba0595b05b17e6c4d6b2b960ec94b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log
Filesize112B
MD50b6568d32c27bc0334aedaa3a7232022
SHA113ed3fe5bb0f36cfc67a53a70a78c1807c8e1dc8
SHA256c558cf569ab01c2db6989e92556ac155c0c48f32b926505f47bf080ccc9abbbf
SHA512e90551b1307d0ddca33e099961c4f7939332acefce52712f832ae469a95efce089f51d7a2ccc663e0bdb95832e93cb61c3501720bc7d9928ec314639c531f834
-
Filesize
347B
MD50dd3334fb9c459a6a5a3a1f1b0219bee
SHA15c38f2aedd40f0ad7b070ae099125f67176d2624
SHA256448b9e9560139f9212ccca9b1e03b3787e73112f9f30e497004d6494e028a463
SHA512f7c0fa9fcf6d8720db7a60bd03e4d614f0e74fa855ef0faa4a06675fbed2d6547485c1e88c7edacc85890d34dc31e01b36e5749860df11137319953197559e0b
-
Filesize
323B
MD5dd2e02121f06e21214e2b2080fbd4bd7
SHA123fc397eaf8abb244a25d9b5a630a5bcdd9fb954
SHA256fe1c59c18121058e14ccc7af5aea12545e5027433733290fe1692851d113701b
SHA51279bb9f21e3814ad7d78e7e57236382f5fb2d5e2e35ab42991bf366943f477e2cdcf0ae2a817542bc2089e5746b137a1f92c59325e211a0a7b2a9ff50382c7471
-
Filesize
1KB
MD53fedf1e151b1d675de31b74ef05f2fd5
SHA110fc177cb5069c817ebca9359933f1dbf4d7aa35
SHA25680b77908abd6fda0691ff04249bd0aa7df3016dac7c84a7c37daa2c92b2c0786
SHA512cb2c26e6049abc038f1faf11a1284a666dad7c3eb5dda93422eaadd4720cf7276352b1a91bc12055aaf550f936695e36790ab40b42b23f035dbd8d8cfb0e25ca
-
Filesize
1KB
MD5046154aaf3dfce5b01ac0328a0fc98d0
SHA1d89b0824e1a194ed59372fb93c1806ae9e62d6d4
SHA25608fb0afd8e265f5b1bbabc8c807cd56d36d42ba9ceed9d57d243f860da70031e
SHA512b9ef84447aab7498ccbebefeea25d93d3b6f13b9bfe4c8f2b0b84969cac2803d4d14683dda2c1c5e7e3d96e59b72ba14fc5727f0a408668612a65dc59c6bdac9
-
Filesize
1KB
MD572a8ba94dcdfb4a37972229dd035e911
SHA13d477905cf36f4a4cbfd2bb5827015f16105df87
SHA256b8bc1ba56e0fb57368368b2c5eda1cecf3310ffcf59fe13906e0d532f3c96847
SHA512751c0189640bbe2fa9b84104671c4172fe3cbd5bc6cc0a4db39e2e30160ff95325b07d38e9e15f4dabbb247a3557001d3984efb643a282dd210854c7fc168cc1
-
Filesize
1KB
MD581581b51338f9fbe7c5d1a3868f60018
SHA19059f0eefcab957da61db26c6ff0666679eb4296
SHA256b0c60a80f318ee7629475c120066feada0f6398f21d0c4bb760f3175b1016236
SHA5123e3512f1e4c66b63085001e8df8975a95a986134fd371760cf5273db950f7a605fa335ed07523477c65eb95a31e3ebb540043009b7c71f18a8d6e282f89b4891
-
Filesize
1KB
MD53bab85838dd239470a676e55b729d50e
SHA144335b2ea16bc8d44dcd992fe2143b39ad16e1b3
SHA256c4551a28c00963efd55484d9db7562ebfddf7bc9dcc31598fa004f4e9947ed02
SHA5125fb098a37457ee834be90376d08c345a1fb7075a5b63bf4ba5e2097c2e12e754446f8d03f6a39d2b32fe64efa33f4fce08db57ca4bc7946c1eaa19a7c80a3835
-
Filesize
1KB
MD5e6c51926452a0a394ed1285f17de5a79
SHA1c132421f8f450d5140e5676518f65fed87f255fe
SHA25695b4e7b6860a8c90c9d475c2be1731db690d194cb29150f774ada371a397e397
SHA512d323179f0b1f287d1153ac5f3317414e8f9400d52093d1cc207e2943b78fa7554eec9dfd1259dd21f458f8e409295d96e5b2d365ebefab2db008fc7e642e031c
-
Filesize
128KB
MD545f13b7cb4077665da5370c1dab22779
SHA123190dd156876b4faf18f44428c028b83109dd30
SHA2566295f640f83d1c49f7dfc5f1477f5f41108f833455a8828af80c31545f464aa4
SHA512effd0bf7fb591321ec19e2255a7834b4ea0d62ab9f18beae49c7d362a5d896907ddf16ec66c5cbf1cf6f5bb57d93423de9918536b6972057026fc280f7c97748
-
Filesize
116KB
MD58ef49e3d7fde3193eb0c687ecf58db07
SHA131ce47aab2f69493bc80899b9959a81791559b44
SHA2569c00fcf758adb65ce7f8d6c2dea2e40db01aa8b0c15daa27d5187f78554c7395
SHA51231ae63047fed6c4a7a6090b1dce02f6a3c232949b30659624a005b11792adc79d8a92e229ff190b09e6597ccd722e7d32ade992e5cddb0471e3e83500f36199a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
72KB
MD50e729abac3758b038663ecdf3013e920
SHA1dd1313c1132310e139fed9856aeccfefebeb0c09
SHA2561517cae1e9c6cdd18b691b1639e05009b06f23906ac47abd5f66d9bed14d3c19
SHA5128e2dabbb50b3eea4d1326121eed890f3526165075ada88c308d5926bc10969e8c5285d16dbe6ba023c7052275705afafce400975506f723c03c2442d3d17645d
-
Filesize
2KB
MD508b65d8d14b2ecbf37b9b69e4582539b
SHA1f12207837b51b32fd5c98c6a4de4ba0c5dc56d3c
SHA256408deae10e63d607fcd1d3c4dda210a15e15aad107e32f9d82b6f51205908130
SHA512cedb097ea66a3877124051b9dac507142cf9ca0d68211339e67a296625c90e4196d033b3b38ec548cb99f64e0e85751d155e48eed0048f854ea8812f5b92a5c4
-
Filesize
319B
MD5f0d59049b5a2e9204117c0007968d1e5
SHA1b6207aeb4f447d305cdde0fd6dec8f99668bbf43
SHA25605ef7b835055845ba4604e3cf48802f50eeb8e6a269e90a2268090e207330d68
SHA51251e966a1d922724a92df31265511dff327f635327793847e98d7031116cd0e0508f49a14b347e56d84512de19777433ee27709f568211a5083eb900ad37f5316
-
Filesize
594B
MD52c2b0592c6bb70bb52742510cd1867c6
SHA1022d24b4ec273bc2d6cc37862bc7fc10a2dd4720
SHA256f3fe06b89595d73e2d855d6d7ce2fcb9662b41d927ad5960feb8a68e7203b2f5
SHA51274b6b016ad2d8b99c2b0963abdac751c23718f2222f218a6538de7b64d1fd5af683065bc9b826cfbd4ae6090f233ebd4c0c2feccf7262262a8c2b540d9fe5e2d
-
Filesize
337B
MD5e0388d68f93f22c9c9cade69f784be03
SHA12420b17e7ea71067d3d209abff458f7f20600c71
SHA256e3c5f7486e5950c93c830d596ee3f6ea5bd69c15795a0cdad5af08e424bdabe5
SHA512bc537bd8a91e1722df5a03d821dda4e06400881ec23419f3dde336916f4aa50867c786926b04f60736c640e34605f86310d78af21cd6608070f025ed9c95140a
-
Filesize
44KB
MD5192e6e7620df582f89da27ded0a24854
SHA17b9af65926166fa9d760387047fa04f00b1bbbac
SHA25684eea4399a74376d9d72fc28c1efd976ab3bdd018710a72dce39a4c770efcd8d
SHA512f524d0e6c5c3bd35fb0491809cf8ee5785849e0304e926a6c9f28f26e3224b6518c33a242ab3241c5171c967ab3cf6d74c00ff9f4bdaba8e08024dd28745bd1e
-
Filesize
264KB
MD52a012e383ada6c032debc32ba0cc1668
SHA14a3cd0dfdd5cd7c245f7173ba505ca49aee0ce6d
SHA256674400546480492d2f7ad58a7743c894e26bd063afda9810308b2a179b390347
SHA51250a36d64c6e6568821f92c722d9a37c80dfa07c66594149b7806fef14cf5a1d8aa7aa5300128ef2a392ce49125449611f9b0ced491a4cab5e3ee4f0f2f592ebc
-
Filesize
4.0MB
MD5acadf1ead352b076f3a2fc02d61b17b0
SHA10ee6152c8e40014f91cf2c38670658eaefafe1e4
SHA256f03e0407e33090e69ddee75853c27889c206975d39399c94a6939eeae08ded0b
SHA512b5bc8da4012b318b46b9b19ddbcc903b344cd45d4753f7f45a49d778770d4f6aacbfccb9a97f4395c6b488dea8225d1bc7e1c679d23d050125fe49f5a5000a36
-
Filesize
22KB
MD51ac9e744574f723e217fb139ef1e86a9
SHA14194dce485bd10f2a030d2499da5c796dd12630f
SHA2564564be03e04002c5f6eaeaea0aff16c5d0bbdad45359aef64f4c199cda8b195e
SHA512b8515fb4b9470a7ce678331bbd59f44da47b627f87ea5a30d92ec1c6d583f1607539cd9318a5bccf0a0c6c2bd2637992e0519bd37acdf876f7a11ed184fb5109
-
Filesize
17KB
MD5913728da90cf90d8e78af59c60b47c3d
SHA1f42f2a545d4fcaf4f76d0f060f52e33a47df7f1e
SHA256b0b478f9aa6aaf8d5811e296047ae1f8ee07f4c4998fe9d7b960755ea1fafb82
SHA5123af86e053dd56aef03e6f967a49b1a0d492616a71e2e49090e0c8e5cbe58ff37ccc55e91f06bf34096059a49f3de84b0bca587f3f17c366f97c0f7a0fd17c974
-
Filesize
16KB
MD5a33b3a3fdf5161be5bd861804961f557
SHA168a57897f1686a3e62ce9808165e18f31661d077
SHA256ac33d8bc6d9a5e769472877d7dd3d035f8088274b886b16cb1898b106da48560
SHA512c94c29a5a9da89044504fe06702f00a7fdd5bc7b85e1733c0cc9a363a812c8d8f95672ea7731643229fa4ae2f1a632c73096d90b63799f5bae7639b41151ccb3
-
Filesize
17KB
MD56bc4851424575eaf03ebe2efee6073ab
SHA12d014fe2feb929d03a46322645a94556ca5c9e96
SHA256abaded8e235fdf329521806af30a1cc7701eaca3fe2efccb9da760ec6d8e5e4e
SHA512af3b7d93fa2243475d74d4bd7f918ce2706bf6eca28029b9e49869f5f793e483efaafdfab1fed6306d5fc77a5ed3b27097b27448cd04560bed4df6fa3268ccf9
-
Filesize
17KB
MD5fc97b88a7ce0b008366cd0260b0321dc
SHA14eae02aecb04fa15f0bb62036151fa016e64f7a9
SHA2566388415a307a208b0a43b817ccd9e5fcdda9b6939ecd20ef4c0eda1aa3a0e49e
SHA512889a0db0eb5ad4de4279b620783964bfda8edc6b137059d1ec1da9282716fe930f8c4ebfadea7cd5247a997f8d4d2990f7b972a17106de491365e3c2d2138175
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
11KB
MD52ffc9e0b985acfb8776743b3077ad5bb
SHA109f25bd6dec59a2402ae669b30845c60e86d80de
SHA256a868b631560add0b704ec01a043c4e41571b8a4fd279a1054c8f6a127a5792b0
SHA512620182be844aec70b26dbb86d27022389615ce50acfe97f294230cbe64a81d4f3434e0ce82ff3287f0f19de6d28ad4804036aea886ddd9fb5ba108a1c7ab20cf
-
Filesize
10KB
MD55748cb6a85e9d5938c73268c2b4eaf0f
SHA18cb5624cc4c3e21693ab48713c8b9aefa6b3b9b9
SHA256af2b84883ce347ed4a6597df7b08672674b55b2f86e4211ff83cae7765d3eea9
SHA512b462f0c90f7f8467819f54b197848663a5bf5b1d9ca4d4ba5ecf0e6f52cd0c29fed1b2cd7a083b3619810e7ee9f8a52c3a1bdbb7605547837c601b84d780e879
-
Filesize
10KB
MD59a7f2bd71e2f3b8d5d3919b4173b0b17
SHA1f402e7f9dbef5d8def6208a207412801eb520c06
SHA2560d22407e91fd06b83530974bf3455ef6bd7c0d01ddb32381f12bc92852761f71
SHA512067cc5edbc557a8b6c0be4be59afad1e520d1e322f5e22bd28f20703f616ba85c96599685e148bcede040979a1301aba861f20392de642943387799d5c621ab6
-
Filesize
11KB
MD5c7315f921428bfe58e922155fcee1df2
SHA1d010cd85a94566acd0caa00b86b02ce9210559a3
SHA256e6b05a0257513143de9349bd38c3d762594908668f708e4d51824ff1b42029e8
SHA5128ae9ffbff7fcb8768deeb84bad427cf7ee9d6b0e1cd23051bb8dd6ec85cab6c5a232536252ece9652f66feea0474eb3caa0dbff1ce1a4a080e714703f7d9f925
-
Filesize
10KB
MD58f657369d32c9d43467f9afd87727bde
SHA17a653aed234fb16cb8336b158d24151a3660039b
SHA2567d158e3c2db222979ebbf94361cea7af0a32cdb52570622fc51f3579cfc05cfa
SHA512550894b001bc307d4f7810c57990235badc1e31fe22bcee51167ef5da77573b5cfc83e8bd7a8d8253a4622ede6b52cc64efcf8889a697fd5cbcc5667a0585b1a
-
Filesize
264KB
MD52fa812328e27456e91acff38e9285f0e
SHA1844f30be897320642d160f581e1b0bd2b3a3f054
SHA256dcb48d52b27be4179ae151926d997c166ddd65f9fc7aca5c27bf5a4d2ad3159b
SHA51207a70abc6b9ca77e6a85bee427e5525bbda2841eabc71343c471b46061f10befe65cdfed442384d67a6b8ef7c44a994df466deadd7c4d436405b3f8a1d566981
-
Filesize
264KB
MD5031860778d7f329ff22f02d5ee39e6de
SHA139dd7c790665de521099b0dadd8373d496544c56
SHA256b1e4ce3389eebd2e8482fc4448c8e06ca92ba785c940ad4db3b5d70e16cc5a0e
SHA512fed3dafa03ad42e8cd0036568ffaf5e8f349257de778ac8deccd24403540b85236df6fc1025b7d62f2b0dbe45e3be92f8f72cce27ab64cbc3e2b80e6ed60702d
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres
Filesize4KB
MD5ca534daef8bb3b76490311f5a0edba39
SHA1ca7c02576ec6a8d97d7cc458c67b876300dbdbef
SHA2564e79dc69146f806a8e41b623d24779cb09c32f5908c4c9c3f71496a4d74db641
SHA512c0ef2d01d7d615884c0906aad12483d154b0debde3256768302fc721de37f56153b245e79d180fa5a361206c314c794ff8a715e337d6097a0bd5b58338857007
-
Filesize
28KB
MD59e7bb9c31083cc3a0f561d12311c9d83
SHA19102b88339566d5f0490c25180632043c8bb1809
SHA2562658178fd2cb498195032c531bf3bb037954e0614aaec4c4ac2637f08d949bc1
SHA5121fb30279a1f951a98f609eb749deb6c77082c28a30e1fdd4f3224ddac8ddfad134e8f3c44f82c32501da8a93a978e6cf8dfe591039a0e6af0d4d2a1dc5445699
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
141KB
MD511fcfc87d47c77ca7e63b45abfc786e1
SHA12cb640aea291e58ae4985ae1f1febddeb9af64bf
SHA256d13633111004f3d06bb96ce54e86f4efcf9c7d9e66f902ce0ea534f6eff1dc49
SHA512006a57d76dde378fc9c0ffe4e74de644fff6e2ca4471dca50b44a6899abd4089605988a0bf2f773721edff5aef3723415a05dd0fcb8f3551f1f791d526a42541
-
Filesize
17KB
MD59bd58b4f01e36c0c197be92bc1af34bf
SHA1a0c5c7cb8caabad44e5d0d9f3dccae89592a386e
SHA2564a68d580e9a68b7e18ee383ea8b66ca17f7507648d09d284966de927def769ce
SHA51294c560a8e56b977ca1a8c612fdba7b9fd6197db025c620e6cf7c72f3ca5dc02bf13946eb7ea465731fd0a1dd22764e4075f953f1e3c56fa0a0a9ad1d927a6193
-
Filesize
1KB
MD5d5787516a1077caf6fabe4a4d8854298
SHA16be06018fc1bda094f29d4f829276f3a75697428
SHA256e0a6f2e07aca0db1de67bf0c51fa8f7e20a6579f8f1e9d1fe8f18cbc12be4042
SHA512273a17fd6b2ce6303aee7b0f0ba5ca6591ede68f60ecf58183417a197e86fab27281e9bf0059fcf88e9effd1d8ae167e1b1547185c60000bb885ad664cde9a6c
-
Filesize
418B
MD564e616c5578e2b5cbdf86f3e5ce8250b
SHA1b1bcd049d95079f525a2e0a743c3450be3c0bcf9
SHA2563c94902c94521dd08e09492785a0489d07df44627dab23543b9838feb61e5c39
SHA512e894d0fcf58af41a49ed07a0eb862c27539243381865275713c455dcdac96fa3b4b5e32184c8a648d7eef98744d22066a1b3f67a9a38c01aaf36a275aba87945
-
Filesize
2KB
MD5e3beb780f0bb00ad3f5e4f51be92220f
SHA12b03a0fee944a08ba76bd3500c92c3f63149c545
SHA256f7744402704aa7b7f309d69f733c75d6db79d1aaa91abe62852f4dba417f07da
SHA5121f0b9b58a719a9ff38a023ec5ddea26cea01bb931088b2e57b47abb62d83e3033780d85bed0d88b08f0ba0a7917a94c7fe330113f7dcfe765483282e9a853b1d
-
Filesize
98KB
MD5818f71d4426da262d4039a52d024544c
SHA1a2c619bcaec2c6f8d8f4a40e3a0978767bab72e3
SHA2568fcbb0965a7273a5ec58af0969ed74a3ed2617db5d62e5cd1c324fc9a2c75986
SHA5122bcdfcad6c17bf116d260e19b3fa515ecc18f57e00d1aecea1f96dc3676dbd6d75998f9f559aa66eafd8361e602489c64b3620a32b5cad033b68ce5d4dc14a87
-
Filesize
17KB
MD57cec951c1783a51fa7ff3e2abcda54d4
SHA1b3d23f045cfb058f61c8febed38c684fc7dc2239
SHA256ea06a1ca5568f5f0d87bc362609dfd12d837494f797403245e9b44d58ae1a2b2
SHA5126814c8357f84555e20cb4d1bb07588d2b364886d799eb59efe527241b9d1c04ee303f819f1273efd013ba107e19c3c9d355b0097be1c34b7ed9df91298faa603
-
Filesize
1.8MB
MD57b7447b345be7891c781915ffb1f4dce
SHA1891a05f75b952880136426f409435ece5d5b7a0c
SHA25691e0b91a628c32113dbffd820cbe219a55f54d68b4aedbdcc849c70ee3772223
SHA5128976d11781f610360b5c2aad70648107bdbdc1c99cd6a1c146162743312dea56f8a6b0ba35dc040c1a098369eac13a055c7a8157de8611d34b4e79d2c2b213e8
-
Filesize
726KB
MD508caa63827edcdfa2a9f25eb6b7ef7a9
SHA1f9716f4e53f4eba0781f07276cbb60ad001024b6
SHA2568fbc1e6dd34540b8986df1644e7d1a1a85820330e1c581ad8d81843763e29025
SHA512c271a303eb4545725b2467c8e3d44c2e0cd8ac547fd2127c1336d93129c655b15b75db24bc278699f144ef871a78e482ae8138ff46638aa029dc4273d35ac9ec
-
Filesize
159KB
MD5aef511727659f2c094496d661e113b93
SHA18a63f6890310ba58295d526c08c1691ae698f3be
SHA25672a5a377f5a481611e95a708ad1324ea12db3475f69be24c5ece3ca6694af666
SHA5122b70a900919edc2b85f3cfaf960113ad9f3fdb77dbc9f8fdd71256b51a3d1140f57685f596bfe9a57cb47a6dc9b7ff08fdb4bf2dd05788294419297fd0669ecb
-
Filesize
421KB
MD5bd157b0ad9efe0eebed7b60e061d4494
SHA1abc2c6ca0083da3584cb899199f0b3be5880cdaa
SHA256a2d4a0a937f92701271412179f46265e151377ee5d612448dee5b4464b966fd2
SHA512d979e52309625f5fca2cc9d1ba63c4203e6b3230a3b348a37fc943ccd7e4daa2ea25cba7d884a992b27cc0cbdf32c4af29b24faf8449b4f0e3c8b9348f69975d
-
Filesize
568KB
MD5a23f7641dba2c70be8d23d626f1adc21
SHA111e327b76079402a0bfa55f572731102d7630d12
SHA256385b94df8c0ad36fe074e09b69c06f427da95958555690ae65a51fd913f5a4ba
SHA512b83e577cc6f2e47765033aa684ac6ccaa9d0dc3e01b44c0bb537a367c7f8d801e633aac34c5f2239b267c8f5e5bb6c6ac577828af9909b06d21e619f7ba55ef1
-
C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\CollectData.dll
Filesize5KB
MD5e0b0cb29516c2857b41cfc1c4bbf3725
SHA120fb42e34cd2a5d616d3937014fd72b1bed52280
SHA256386551e08d43522c66aa6811c3cfc7af3ce8fbdcadcba860723b1b06cafe594d
SHA512d275a34d7acde444f82f2057196259b5a9bc845acf82932215e45758c7394e471b4c97b331a62b42195b5b32db94ed0c115d0f31e598bcd693a71f15fb1eb344
-
C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\CollectData.dll
Filesize6KB
MD5f2aa335388f4d6c30b761e45987f6693
SHA137d33c1c54b33f3b52cb7f245b575debd85fd0f6
SHA25635fdd8ccff83d6a2690ee3f8156f908090dffbf54a0f387ba7ead16f55fd5b55
SHA5123e7b43db12ca372c245a82d0f4eb19b177a9fd4d0ecd248e60d55281d8e67964707191edd1947257f93f687370e22b1b79bfb8e7e84598ed67d13c6772cf5da3
-
Filesize
426B
MD5a059aefa92b05a51d9e294e9eb8ef564
SHA121cdab851c0d78cf1f53375e68c5d0ed966ed1e8
SHA2563aab164369e5a54549ce60225881aaa9965be32d1e8ed3681c4e7d790cbc1f43
SHA512cebf51fdc0ba886e916669f7eab28b0b877dabcd07694c77edbcfd6445210af0249d33bd908ca0b62d5516b311612739bee62e421ff3373bda8eb3be14aacb6b
-
Filesize
538B
MD5944dd915f86d365d42a12d11dbfbba24
SHA1326a6c26a637b88e20acb72e0fa06685b57e5556
SHA2566f86ab470cf54292042a8a84eaf89ed7a3eccc5be42f7fbca606c26c2cac181b
SHA512d53fc7550ce4eca043b66d78025c80f7e6da4f259634016f0c946bcb8e26154ebdc29e6931d6ef10620578e984e46f301f91ce36884ef7fda5b80f69cef1c2df
-
C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\ImagingEngine.dll
Filesize1.8MB
MD5d48617a39efae91973dd8a9458140896
SHA1b22ebbb2b49d23192ad753d9194ff04350442f99
SHA2561160360f25d5d1e263c7eadf03240b251b1dcb4263cb2afcf431619a08346d0e
SHA512b302ad0550c44141e34b5d7d50b0a46d3c5182d9942034db7dfa22972bcfbcf14ece99b8763b1ed6488733ae54f172cbf31cde1c915b48be8e654a4fc62e9373
-
C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\Key Downloader.dll
Filesize4.6MB
MD530decee483a8196b30643ec6a453a7de
SHA192266131aff3595c5a95d3aa23c9e40c85d5f982
SHA2563dc254ad131a691acb1f9e3a5bb5ca5b3ea891869e516f4b3580ea4fcfdf2e76
SHA512a8f370c060223d4c2985ac16e78547779e584020e95428e85b497464fc487611d7b080908f904c11aa93bc7b56ec102845fbb6554d97dcba7fdc856c93087f00
-
Filesize
47B
MD51a1ea0c1a7df5f91ecd62cda837a3273
SHA1f358bcfc14b04949db83e04c4e181f526b3fc5f3
SHA2569fea0616868155973e2b5ca5d1524359e47916e8aee14dfad123b533c737ee76
SHA512666a013157c5544ef7ebad000d6a5e0f2b4020bb7e7d8792880b7c35c662b1c710e25a8893f75b8599cba5bb934c18f91a689f0f24c53b287e601475b1ae9f01
-
Filesize
277B
MD5ead2d73ab39abc2db631bdaff49f16ce
SHA13f38c84e9d6bec637957294378b26f3789d596db
SHA2564506b1933b952659d60ca7d15073b77a083299f0557623c0bbc136c051ca5055
SHA512fbbf2ee7a004cc4c7d7008ec09aa336e8c31b39a439597979e5d077b5a682d7db1e693314b92e98a6bf9e26a19e3e55a465da548d8c56eb9b31a843ccaf9a280
-
C:\Users\Admin\Downloads\Windows-Destroyer-English-main\Windows-Destroyer-English-main\wmpnssci.dll.mui
Filesize4KB
MD57711764a1a29e3e833afa0a239232869
SHA15b318f03828bed964b31dc8a2e3c99fc24f30fb2
SHA25698f757138f24bc139cdf8a9c23dcca46832a0522b2ea831eb8f037ff7ab655c5
SHA512074961c08695c9334406f5660b1bfd04ff01e18d96e6f55a386a9be581e5922534272059d1b6ac81d00fc8f7ca1e42220e7b7195d6c7883caf6f12bedbf788f7
-
Filesize
3KB
MD50779bdda304d0970493f6797601d8095
SHA1d8414c041347767b44a3386874a2b921648c86c1
SHA2567766cd3118d0bfd8d4e87cb68d97cfdac5fb394433a1840e86fa2ca821a4e902
SHA512e4f696b0245663a093c099ce06d8370598611ba9132975346ead5fe71d49172db7ee7c5f27f1aa5a13c7140f0ba76c273d8c0299dde6a17ecea0696bc19cee05
-
Filesize
28KB
MD5c4a0b1c4c83d910878d79c3da7984656
SHA16b20fd94bda1a435510f9a8a3f7228b2992fd772
SHA256d5bcd5588193f828f4041f1b49aae7c1d7872384eaaaa0ba0b73e14f950bc134
SHA5122bae05c8203620060bd02b5a51325a76f879f58eacd576140aef9db8f1948981b15f75fea04cef4db141e1b5ab7ccc780a903bfdb0a053b0aeeabd8ab87b7eeb
-
Filesize
28KB
MD51524a28cbc30e70c60bc6cf977f82229
SHA1664f15cea146b654ec4a60c76071ff83c4dfa651
SHA2568561191653adc4ee6cb03a5c1953bd993782689600adebcd8776754147668f9b
SHA5127fbee3bc38aca8ef368c1ff07eb1f4fb3f178628f8b41430eb1006c63bd908f26a1d85a19f2d661b02d3842505c9c762c8056fb2f1619b92a3a6d1085f0b9c50
-
Filesize
28KB
MD5db2eb3078f924bc0049ae6e98653f2b0
SHA1fc058c55c2b670dea826418aebc602ad737f6285
SHA256f37b5230deb0e25cd3721e8b6653036b26dde8c7d567e4639458192daacef9f7
SHA512dca8ec245c856def9ff56536537b91456c967966939e94b602c085282ebbe5c95e12bb9f48772d3dbd43087ce3317debdc87bf635f3972b048ea4ec811d1b50a
-
Filesize
11KB
MD54a83df1d945c2f5801ed59650d7460eb
SHA131827890e1df99268c0f80dcb26774225e4c3a5d
SHA2562d993be76dfcf35f89b656b4dbc553e078d824974b482e56c6f76eaea87731c8
SHA512eacb88683e3c999a1cdc9d9e4a4030723164e358d7cd85f7cfc02b99f33be991c89af5602349b48b5388520968a43a2a45b4b6d2f468f2b888088cf95bd591d2
-
Filesize
10KB
MD509ca17eb552722bd7004097f59b07518
SHA136cf9da188460542e58acb97fa0ef0bfd9a4e172
SHA256365c32c3c09228158ab5aaabfcf93cdfcd858be0b2a00031d82ab03070f61a5b
SHA5123dc6ed86df50f87b12635032fb30840e94bea699ac193a16099a2ce1a9bd5e39147f115fb938c177991dc0dcfd5abab075632a1d0b46e6009a86eea3a27156bf
-
Filesize
5KB
MD596c0e61f3298cb745b021f67e7dd0d48
SHA1a61adbe460c68a3087ff1ba75620dbb86af28e40
SHA2563e56c22a81ab1168036a289c7ffe2889dd678c422568dff9ef91d6a0f9005333
SHA512dbbfdd4ad2c80ff9df0b21dfd011420baba54a7114d0e0ff5371dda9c9389d90422a4311881ac2bdb5ba7c4334d210b61c6c0fc691ae503e32930109d9251f3e