Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe
-
Size
624KB
-
MD5
0168a4daa9598e991e140057e59438f6
-
SHA1
72f715a55aa1ac4a0ea8f1f59406225395350994
-
SHA256
9ec6bf1ad038e6c7f5bf9be374d3299df033424ef1399a8ffd892df40efd6353
-
SHA512
5c94d60a2ae25fdbc7084a6ea183ea50140372b3b2898e5b6b6f305372d58d273f5eab1d18d3b2b785df35eea8b3e2d4e915712bcac0df5ca6eccb0bc4c5e054
-
SSDEEP
12288:T926SX4bMjJCh0cnvpV7WR9tGNQZHA82lmRq60+lAv/2VMePNhEu5Ih8ekUo5RwQ:pfkWMJmVSvGWEM3v/KwkoaRsRWPnexh
Malware Config
Extracted
F:\!!!READ_ME_MEDUSA!!!.txt
https://t.me/+lyskiDn9KiYxZjlh
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/
http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/e6f21de05f1464b937174af0eecf5a2e
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/e6f21de05f1464b937174af0eecf5a2e
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Renames multiple (8937) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3181990009-820930284-137514597-1000\desktop.ini explorer.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3181990009-820930284-137514597-1000\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Music\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3181990009-820930284-137514597-1000\desktop.ini explorer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3181990009-820930284-137514597-1000\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ca-ES\View3d\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsPowerShell\Configuration\Registration\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_gridview.svg 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\PREVIEW.GIF 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Spacer\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-96_altform-unplated.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\MediumTile.scale-100_contrast-white.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptySearch.scale-150.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\SmallTile.scale-100.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-20_contrast-black.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\View3d\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-72_contrast-black.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\compare-2x.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\EBWebView\x64\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\Locales\ug.pak 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\hand.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\es-es\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\TURKISH.TXT 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\.version 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-125.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\stickers\word_art\sticker33.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-16_altform-unplated_contrast-white.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-36.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\VisualElements\SmallLogoCanary.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\mt.pak.DATA 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL002.XML 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Square310x310Logo.scale-100.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\NoProfilePicture.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxSmallTile.scale-400.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EmptyCalendarSearch-Dark.scale-200.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\SwipeTeachingCalloutArchiveImage.layoutdir-RTL.gif 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Internet Explorer\es-ES\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_nl.json 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-96_altform-unplated.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxWideTile.scale-125.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-32_altform-unplated.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MEIPreload\manifest.json.DATA 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\EBWebView\x86\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\psfontj2d.properties 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdCO365R_Subscription-ppd.xrm-ms 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreLargeTile.scale-100.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNewNoteLargeTile.scale-150.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_ar.json 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\SmallTile.scale-100.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\tr-tr\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-64_altform-unplated.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail2-ul-oob.xrm-ms 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-white_scale-180.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffffff_256x240.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarMediumTile.scale-200.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hr-hr\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\ResiliencyLinks\Locales\cy.pak.DATA 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_KMS_Client_AE-ul.xrm-ms 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-64_altform-unplated_contrast-white.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\!!!READ_ME_MEDUSA!!!.txt 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-60.png 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8072 1640 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7672 PING.EXE 7840 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Kills process with taskkill 44 IoCs
pid Process 6528 taskkill.exe 6956 taskkill.exe 7096 taskkill.exe 6496 taskkill.exe 6624 taskkill.exe 444 taskkill.exe 6196 taskkill.exe 6304 taskkill.exe 7020 taskkill.exe 6676 taskkill.exe 6332 taskkill.exe 6856 taskkill.exe 7044 taskkill.exe 6276 taskkill.exe 6440 taskkill.exe 6748 taskkill.exe 7132 taskkill.exe 1920 taskkill.exe 6504 taskkill.exe 6352 taskkill.exe 4048 taskkill.exe 6568 taskkill.exe 1588 taskkill.exe 6948 taskkill.exe 1112 taskkill.exe 4556 taskkill.exe 6892 taskkill.exe 6272 taskkill.exe 6564 taskkill.exe 7052 taskkill.exe 1888 taskkill.exe 6724 taskkill.exe 6896 taskkill.exe 3748 taskkill.exe 6916 taskkill.exe 6608 taskkill.exe 6796 taskkill.exe 7032 taskkill.exe 2592 taskkill.exe 6148 taskkill.exe 7080 taskkill.exe 6680 taskkill.exe 7164 taskkill.exe 536 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Julie" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Adult" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{14E74C62-DC97-43B0-8F2F-581496A65D60}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\CortanaVoices\\Tokens\\MSTTS_V110_enUS_EvaM" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Katja" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "SR en-US Lts Lexicon" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\ja-JP-N\\c1041.fe" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "English Phone Converter" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Speech Recognition Engine - es-ES Embedded DNN v11.1" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "MS-1036-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{0CFAE939-931E-4305-8D05-8C76C254EB34}" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "0" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Sie haben %1 als Standardstimme ausgewählt." SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Speech HW Voice Activation - German (Germany)" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\System32\\Speech_OneCore\\VoiceActivation\\en-US\\VoiceActivation_HW_en-US.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "SR ja-JP Lts Lexicon" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "SR it-IT Locale Handler" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{A79020BC-1F7E-4D20-AC2A-51D73012DDD5}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "SR Engine (11.0) Text Normalization" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "HW" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\fr-FR-N\\L1036" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\ja-JP-N\\lsr1041.lxa" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "1033" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "{6BFCACDC-A6A6-4343-9CF6-83A83727367B}" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft David" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\it-IT-N\\tn1040.bin" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Ichiro" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3181990009-820930284-137514597-1000\{C9B4F92A-A0BA-4931-8B70-8562739A5E5C} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "409" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "11.0" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Pablo" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Speech HW Voice Activation - Spanish (Spain)" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "- 0001 ! 0002 & 0003 , 0004 . 0005 ? 0006 _ 0007 ^ 0008 1 0009 2 000a ~ 000b : 000c a 000d aw 000e ax 000f ay 0010 b 0011 d 0012 ch 0013 eh 0014 eu 0015 ey 0016 f 0017 g 0018 h 0019 ih 001a iy 001b jh 001c k 001d l 001e m 001f n 0020 ng 0021 oe 0022 oh 0023 ow 0024 oy 0025 p 0026 pf 0027 r 0028 s 0029 sh 002a t 002b ts 002c ue 002d uh 002e uw 002f uy 0030 v 0031 x 0032 y 0033 z 0034 zh 0035" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "CC" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\SR\\en-US-N\\lsr1033.lxa" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Zira" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\TTS\\fr-FR\\M1036Hortense" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Elsa - Italian (Italy)" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Microsoft Stefan - German (Germany)" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "%windir%\\Speech_OneCore\\Engines\\TTS\\en-US\\MSTTSLocenUS.dat" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "You have selected %1 as the default voice." SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Universal Phone Converter" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "1" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK = "Male" SearchApp.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 7672 PING.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 6528 taskkill.exe Token: SeDebugPrivilege 6568 taskkill.exe Token: SeDebugPrivilege 6608 taskkill.exe Token: SeDebugPrivilege 6796 taskkill.exe Token: SeDebugPrivilege 6896 taskkill.exe Token: SeDebugPrivilege 6956 taskkill.exe Token: SeDebugPrivilege 7032 taskkill.exe Token: SeDebugPrivilege 7096 taskkill.exe Token: SeDebugPrivilege 6196 taskkill.exe Token: SeDebugPrivilege 6272 taskkill.exe Token: SeDebugPrivilege 6304 taskkill.exe Token: SeDebugPrivilege 6352 taskkill.exe Token: SeDebugPrivilege 1588 taskkill.exe Token: SeDebugPrivilege 3748 taskkill.exe Token: SeDebugPrivilege 2592 taskkill.exe Token: SeDebugPrivilege 6496 taskkill.exe Token: SeDebugPrivilege 6564 taskkill.exe Token: SeDebugPrivilege 6916 taskkill.exe Token: SeDebugPrivilege 6948 taskkill.exe Token: SeDebugPrivilege 7052 taskkill.exe Token: SeDebugPrivilege 7020 taskkill.exe Token: SeDebugPrivilege 6148 taskkill.exe Token: SeDebugPrivilege 1112 taskkill.exe Token: SeDebugPrivilege 6676 taskkill.exe Token: SeDebugPrivilege 6332 taskkill.exe Token: SeDebugPrivilege 6440 taskkill.exe Token: SeDebugPrivilege 4048 taskkill.exe Token: SeDebugPrivilege 536 taskkill.exe Token: SeDebugPrivilege 6624 taskkill.exe Token: SeDebugPrivilege 6748 taskkill.exe Token: SeDebugPrivilege 6856 taskkill.exe Token: SeDebugPrivilege 7044 taskkill.exe Token: SeDebugPrivilege 7080 taskkill.exe Token: SeDebugPrivilege 7132 taskkill.exe Token: SeDebugPrivilege 444 taskkill.exe Token: SeDebugPrivilege 1888 taskkill.exe Token: SeDebugPrivilege 6276 taskkill.exe Token: SeDebugPrivilege 4556 taskkill.exe Token: SeDebugPrivilege 1920 taskkill.exe Token: SeDebugPrivilege 6504 taskkill.exe Token: SeDebugPrivilege 6724 taskkill.exe Token: SeDebugPrivilege 6680 taskkill.exe Token: SeDebugPrivilege 6892 taskkill.exe Token: SeDebugPrivilege 7164 taskkill.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe Token: SeShutdownPrivilege 3304 explorer.exe Token: SeCreatePagefilePrivilege 3304 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 3304 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 5912 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 2996 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe 3992 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 8056 StartMenuExperienceHost.exe 7100 StartMenuExperienceHost.exe 7184 SearchApp.exe 8096 StartMenuExperienceHost.exe 2928 StartMenuExperienceHost.exe 720 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3408 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 86 PID 1640 wrote to memory of 3408 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 86 PID 1640 wrote to memory of 3408 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 86 PID 3408 wrote to memory of 2252 3408 net.exe 88 PID 3408 wrote to memory of 2252 3408 net.exe 88 PID 3408 wrote to memory of 2252 3408 net.exe 88 PID 1640 wrote to memory of 1108 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 89 PID 1640 wrote to memory of 1108 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 89 PID 1640 wrote to memory of 1108 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 89 PID 1108 wrote to memory of 3044 1108 net.exe 91 PID 1108 wrote to memory of 3044 1108 net.exe 91 PID 1108 wrote to memory of 3044 1108 net.exe 91 PID 1640 wrote to memory of 1412 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 92 PID 1640 wrote to memory of 1412 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 92 PID 1640 wrote to memory of 1412 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 92 PID 1412 wrote to memory of 3500 1412 net.exe 94 PID 1412 wrote to memory of 3500 1412 net.exe 94 PID 1412 wrote to memory of 3500 1412 net.exe 94 PID 1640 wrote to memory of 4344 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 95 PID 1640 wrote to memory of 4344 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 95 PID 1640 wrote to memory of 4344 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 95 PID 4344 wrote to memory of 472 4344 net.exe 97 PID 4344 wrote to memory of 472 4344 net.exe 97 PID 4344 wrote to memory of 472 4344 net.exe 97 PID 1640 wrote to memory of 396 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 98 PID 1640 wrote to memory of 396 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 98 PID 1640 wrote to memory of 396 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 98 PID 396 wrote to memory of 2872 396 net.exe 100 PID 396 wrote to memory of 2872 396 net.exe 100 PID 396 wrote to memory of 2872 396 net.exe 100 PID 1640 wrote to memory of 2292 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 101 PID 1640 wrote to memory of 2292 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 101 PID 1640 wrote to memory of 2292 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 101 PID 2292 wrote to memory of 1808 2292 net.exe 103 PID 2292 wrote to memory of 1808 2292 net.exe 103 PID 2292 wrote to memory of 1808 2292 net.exe 103 PID 1640 wrote to memory of 3644 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 104 PID 1640 wrote to memory of 3644 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 104 PID 1640 wrote to memory of 3644 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 104 PID 3644 wrote to memory of 1892 3644 net.exe 106 PID 3644 wrote to memory of 1892 3644 net.exe 106 PID 3644 wrote to memory of 1892 3644 net.exe 106 PID 1640 wrote to memory of 744 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 107 PID 1640 wrote to memory of 744 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 107 PID 1640 wrote to memory of 744 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 107 PID 744 wrote to memory of 3772 744 net.exe 109 PID 744 wrote to memory of 3772 744 net.exe 109 PID 744 wrote to memory of 3772 744 net.exe 109 PID 1640 wrote to memory of 4800 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 110 PID 1640 wrote to memory of 4800 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 110 PID 1640 wrote to memory of 4800 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 110 PID 4800 wrote to memory of 4908 4800 net.exe 112 PID 4800 wrote to memory of 4908 4800 net.exe 112 PID 4800 wrote to memory of 4908 4800 net.exe 112 PID 1640 wrote to memory of 3936 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 113 PID 1640 wrote to memory of 3936 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 113 PID 1640 wrote to memory of 3936 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 113 PID 3936 wrote to memory of 1532 3936 net.exe 115 PID 3936 wrote to memory of 1532 3936 net.exe 115 PID 3936 wrote to memory of 1532 3936 net.exe 115 PID 1640 wrote to memory of 3760 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 116 PID 1640 wrote to memory of 3760 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 116 PID 1640 wrote to memory of 3760 1640 2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe 116 PID 3760 wrote to memory of 4948 3760 net.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:2252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:3044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:2872
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵PID:1808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:1892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:3772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:4908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:4948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:3588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:3512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:4148
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:2928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:2788
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:2404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:2324
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:1552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵PID:972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:4448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:2212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵PID:2908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵PID:3520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:2680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:3768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵
- System Location Discovery: System Language Discovery
PID:4976
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:3740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:5000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:1760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:3068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:1104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:4308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:2316
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:2016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:4920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:5092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:2516
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:2444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:4336
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:4796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:5016
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵PID:4216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:2228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵
- System Location Discovery: System Language Discovery
PID:3320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:3108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵PID:3348
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:2100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:2192
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:4480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:4636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:3620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:4952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:4716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:4660
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵PID:4860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:2540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:3136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:5032
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:3652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:2912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:4180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:2568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:2392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:3088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:2144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:4808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:4940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:3456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:4476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:1056
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:2804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:1568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:4996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:3144
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:1952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:1284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:5116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:1432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵
- System Location Discovery: System Language Discovery
PID:4036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:4772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:1496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵PID:1416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:4932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:1964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:3608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:4836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:4712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:5040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:3308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:3860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:3272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:3628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:3968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵PID:4424
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:4744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵PID:1932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵PID:4784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵PID:3216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:4524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵PID:2840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:4104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵PID:4564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:1136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:3528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:2700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:2208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:2176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:1128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:3704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:4132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:1716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:4136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:4232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:2672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:2320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:1628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:1836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:4468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:5140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵
- System Location Discovery: System Language Discovery
PID:5192
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵PID:5212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:5268
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵PID:5284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵PID:5332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:5348 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵PID:5396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:5412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5460
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:5480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵
- System Location Discovery: System Language Discovery
PID:5544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:5588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵
- System Location Discovery: System Language Discovery
PID:5604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:5652
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:5668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
- System Location Discovery: System Language Discovery
PID:5712
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:5728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵
- System Location Discovery: System Language Discovery
PID:5764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:5784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:5824
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:5840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:5880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:5896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵PID:5940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:5956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:6000
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:6016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:6060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:6076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:6116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:6132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵PID:3384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:5156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:5168
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:5264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:5300
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:5344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:5404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:5364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:5456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:5448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵PID:5488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:5552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:5660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:5700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:5768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:5832
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
PID:5804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:5860
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵
- System Location Discovery: System Language Discovery
PID:5908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:5904
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:5996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵
- System Location Discovery: System Language Discovery
PID:6040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:6104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:2892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵
- System Location Discovery: System Language Discovery
PID:5280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:5172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:5244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:5240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:3884
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵PID:5004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵PID:5292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:5428
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:5424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:5532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵PID:5584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:5568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:5648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:5628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:5808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:5800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:5868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:6012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:5916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵
- System Location Discovery: System Language Discovery
PID:5684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:5744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:1584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵PID:6092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:1540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:5148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:5232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:5340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:3076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:5384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:3120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:5432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵
- System Location Discovery: System Language Discovery
PID:5492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵PID:5592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:5556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:5640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵
- System Location Discovery: System Language Discovery
PID:5740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:5816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:6008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:5696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:5708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:5968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:6048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵PID:5236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:5184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:1396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:5464
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:5536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:5512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:5580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵PID:5636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:5688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:5752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵
- System Location Discovery: System Language Discovery
PID:5848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:5792
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:6068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:6052
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:3756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:5320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:5400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:5452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:5596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:5796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:5992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:5876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:6096
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:5252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:5472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:5444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:4384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:5760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:5864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:5772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵PID:5632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:4736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵
- System Location Discovery: System Language Discovery
PID:6028
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:5852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:5616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:5780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:5692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:5420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:5324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:5676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:4064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵PID:5132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:5356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:5524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:6072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵
- System Location Discovery: System Language Discovery
PID:5500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:5392
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:2152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:5388
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵
- System Location Discovery: System Language Discovery
PID:5296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:5128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:5436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:5540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:5360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:5312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:6160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:6204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:6220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:6264
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:6280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:6328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:6344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:6392
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:6408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:6456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:6472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:6520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵
- System Location Discovery: System Language Discovery
PID:6536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵
- System Location Discovery: System Language Discovery
PID:6576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
PID:6592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:6632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:6648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵
- System Location Discovery: System Language Discovery
PID:6700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:6728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:6792
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:6824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:6900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵PID:6928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:6976
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:7000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵PID:7048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:7064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵PID:7108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵
- System Location Discovery: System Language Discovery
PID:7124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵
- System Location Discovery: System Language Discovery
PID:6152
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:5704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵
- System Location Discovery: System Language Discovery
PID:6208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:6184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵
- System Location Discovery: System Language Discovery
PID:6248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
PID:6300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:6308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:6400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:6468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:6452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:4044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:3220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵PID:948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:6484
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7164
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\2025-03-12_0168a4daa9598e991e140057e59438f6_avoslocker_cobalt-strike_luca-stealer.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7840 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 3242⤵
- Program crash
PID:8072
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3304
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8056
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops desktop.ini file(s)
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5912
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7184
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:7100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1640 -ip 16401⤵PID:7596
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:2996
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:8096
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of SendNotifyMessage
PID:3992
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:720
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
PID:6052
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5524
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6204
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4284
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7160
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2328
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7416
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8076
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5956
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5004
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5556
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:588
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:8128
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4244
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7532
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6288
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4996
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:6104
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6076
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2528
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5576
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:7288
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6896
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:7204
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:6684
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:8096
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2132
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:912
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4796
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5428
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Query Registry
4Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD56636c39033809a0daadfb2ede3fa5f27
SHA1102f111106229c8eeb3b690bd1185a4182eebc39
SHA256b3c03d8c7c34c4e51ca4a6fd0a67a25e494392480f6f4d050ead85b23c480efc
SHA5120cb9fa479ce1e16cf7fa38a6efba347982a3e9d8234feb50c39b37ba5df80af94c043e2f593f61fd46cccd7bc8477b404bb3bb1107078b66c6e663510a8fc088
-
C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000001.db.MEDUSA
Filesize289KB
MD50c0e35cd7d6ec7c8a78fbb1eb8080f9b
SHA1400b43218c52700302f04ab60ad132ef27e4fd5a
SHA2569c2d7be2a13eb81ba0bf5ef98870251d3413a4bcec08c0ba9c540c797cb40847
SHA512b98a8ffe80403581d3dea3bc19195f2a431015f1db3cdad337c1193c6537a63de4d789956b84564d17cf73213a6b720e8f4308c102f820b24e3efd3dce76213a
-
C:\ProgramData\Microsoft\Windows\Caches\{6AF0698E-D558-4F6E-9B3C-3716689AF493}.2.ver0x0000000000000002.db.MEDUSA
Filesize289KB
MD59cd16163fe7c2ab1b58076a2f0214e4a
SHA187a0c8d90820aefe7b1a9138022b3fdae4fbd540
SHA25673a5538b13e214605ce66eb703863a0795450b29d46d5fef79bb2bb9d2b32007
SHA512108e52adfcdecb7ce0250307f47640451dd20cfd8e528cb85038a623b110c4aa69602723ba70847c63c0e998704491cb82166f65929acc2ebd10a13901dcd414
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.MEDUSA
Filesize623KB
MD5c38ab3b27ebb24ea0bb1129fdbf273ec
SHA115e6587e4c1bf3ca2fee4e57568f37bae2d11b8e
SHA2568f6e49110da199a2ac7438e3d840f018dd4f6a832187eb190d14ab1d9325a03f
SHA5129ae49d4eaeea53239f0df216ad371bd3db67da14cef2a0b5b0aad7a540a02293f805b218415d91adc3e0898c3925e61dd4e5d81cc7d0b11cda68ae1f1e0dac82
-
Filesize
952KB
MD58d2d2522ae4d362606d38ca4fe8650dc
SHA18c8de59416290ca5e5023097f44de3785f23eeef
SHA2564e614ac4de30600fcf783d4a173108a54ab1c393e9822091de82298230299d74
SHA512eb658f8a8832ff2b09d126f9136c1d33b198bf8987c233f055ec796013781676af8b8bd384852357b7d5cc0f5e971a43f95ad59cd30928947a2a84852280a23a
-
Filesize
495KB
MD5879148c7b2a7f31c020b15e8cc212e34
SHA126226c6f1ddba40ccefeedd5f4898f7b8b3b3e02
SHA256e1c9bbef882844f1229e247ed24bc670ad1608f1a1ad864eb60df4d405ec2864
SHA512aac876c07082d43576953586520b05f7f8c3926cb26fd827f181fbf0fe4f82bf1ba0b37190373c150862728e9566eab7a4ecc39c920cf13df4b0d7aeceded2e3
-
Filesize
1.2MB
MD5683c26fc221bd5eca4d754ad641437ae
SHA18a0822ef41f7c8c76f92213fb985b63006d85bf8
SHA2560b547552f523dc79383923d2a4982bf0ad0ef05bfa812082432e8374b9be883e
SHA51246d64335ffbc702534febb7811803c62917dae462489e5520c33ab09eca623918175e4edc9f5e0e18cffc914cc6cfe42efaefc76b5b57ee2ed355542c0aa3bd5
-
Filesize
419KB
MD55935cd9d40f73eb1a92d3e5bbc7d7026
SHA15a85e14f2516f4173acc5c81de2fae0874acea9e
SHA256d004dae724958bf21630af3550fd5eca0bcb854524c8d619ab715da0bfac0917
SHA512f3ab98c1c6dfc14c2d01ade72d6da80984a64aa8cfa5acf37e78ac89061d9c9805561c230964706216438d8a25c15bada9ccd79ee6d274162e4afd4cb14906f2
-
Filesize
1.1MB
MD5828f39df15c0b18c77ba4a7ae61a5d40
SHA1735d2c819e0d0cf63c537acafbaa6a67a2b709a2
SHA256bbbe2a2b86ea1999e9a54427bb0f7522960b2913776ae679cc4516ec435642c6
SHA5126c82d3cf5df32898ef859b29ea8357bbd795951ee22bc23d6cc1f231c2da97f004b9a6fbe73cf1f5816637968bbf48d1208c4eeee43f2bbf4456e9bc1a766cc7
-
Filesize
1.0MB
MD5f2c55bd8ea830be5376ada837eb361aa
SHA15894ba4c1f821f731d39d42fc01973dfb72dbe32
SHA256d99fdba643a71829c4e26f181d9cc59f41935422cb261c023ddf58684e4cfe79
SHA5128a4a9372ba85e7baf635fda2976ec55fa1db01d481dae4e2fc9121b33779c45f4e4d3eb10c7837e8bc59d85ec1f63fd010cb33f30110cdf4f249a0a1fa08769d
-
Filesize
10KB
MD5d5889f53a1ee3a7d22417157bc3d9f5f
SHA120458c600e7dfe365b33a186c991d05fe5be6a51
SHA25661d972d9e36d4476ab6972bb1682641c88deec486ec1a6e9085e47a2e33f4e06
SHA512841939cae42d9796f2b3befca6bf965b87fd20ab30dc73122aadd61a25762b86d5bf3c5a7fb228cdd5be462e48127edf8e63db686d6493b0b58f68955a64a943
-
Filesize
876KB
MD5f05ccb65836fd23c1b17e2c75012b2e1
SHA137421e86dcaa2024972a9eda3a9c86b06668d578
SHA2564e4c9db80ff2743319f8a92ca323260717dfc4c9ae0d6c8677f17bb8a02979cf
SHA5129e13f6b15c8ce48d70b581da4d7146eec4d7f216b705f91e5980f1b8cf91946d961ccd8db4815d686d271263eaff8eb8fcda56f8ab21d33f90c6ffd50ca61997
-
Filesize
1.0MB
MD5c1a18ea19c5756b1b5813c167f6ee5b3
SHA1649907d8c6ebfe83f8eadc4bc4dac8b134667e30
SHA2564892d6dd728cd7bd4216770a0a260a28c25b2731fa91b3879390238323c1613e
SHA512d6f64de7a87fb22f3e9db528c9df66961480ea45ea29355f16a5f2abe9dd5e882e0e64455d50c49af4fa42ea5e2cfdec69f2a2d74128e9e95a1acfcb60a3e48a
-
Filesize
457KB
MD5f09e12fec3f92b00975cd380060ec221
SHA1710708ef79ef05523326bf04c87e489dd2a4a632
SHA2568fb92c950a74e9ebe00378fbf8024928e26411658215824d583a13a128a1c6f7
SHA512124bdae690a6e718080eeec9db0bbce3214f0790c512fec7b6c67bf7164bd2fdb2e4510f50a2f8ecdd0b0e5fb7cff1f7f75b828e6189ed967dd85c901e1067ca
-
Filesize
533KB
MD501bfddff62c2134dfdff217baadf5854
SHA1f5189490d94110c9a8baa3a305b6424a3995f8c2
SHA25697858583314b062a98cccce076adba0b3d970794739f053ed210a3b9af318259
SHA512ae05516d2bdc8310f88b8cabac8011d04724da83320fd8d8b35abd4d27a5fdda2dd56113246cdfa126557ce013ebb0141348d43877808b71df34cb9b6ea11526
-
Filesize
685KB
MD51cc00b9ea42fbc0ffa7149d0cb1c3bb6
SHA1454bb81f330f8ca746bd1e301580722752f15714
SHA2562dbabb4a005683af8b80cae97c128f1d883364c7c4d1fc0762b254230bdf4432
SHA512b2bf0452c5ebad923281bb0c1603eb137211f3c67fa3753e332fe6128f377aa79186027c03e28c9756153610d09601a5c82a16c9c65bb445feda16777eb7eb8c
-
Filesize
16KB
MD5b509767bea4859c12369367e3210024c
SHA1d087ae0c61c7bea4692346af464a8b2bf4092d8d
SHA256fcfeb4cef40547de905c8631210fedeb4aae0c3cff871e105d5a631cf77a8710
SHA5128f0161fe642b8e8b2168ed8cf51f963fad58abde6e04032fb4f5be1b17b4a8dc70f0d1a490a28538b1d956552719aa6752cec62d6dc03098bd9caf8f94fe4aa8
-
Filesize
762KB
MD5a454814748e89c4964fb0b202b58a140
SHA1315f02cb817a54e98cb8e27f03de300b55078b7e
SHA256ce3c69100163e78826a4809d4175b7f79044fea6c87cde00431a88710edd9ee5
SHA512d66a709cc8bc35fd076f9a4f71d8d585951b2ec0fad2a433e5a66c7906b16ae0733983cb07f7af16bc2d7c1dbaf51c659342725c1fb885022e6db3b995aea6f1
-
Filesize
800KB
MD577c481dfd0bfb8a7efa4a000feeb7ce5
SHA11c108b77543d3e6c98f74649466df953a53d09ed
SHA256047be0d7e7cdf3d9d3f7c3124b5006112d6e1100ab9d95171144992ae9d5dff2
SHA5125705a1844dd2a47632450e7c4cf7b969f1ce773f26610541970fa25afe6672eff2a099a7fad3efb4241f16d3c714de3cacc6dfe5baf8aefc0df9b2543136bb94
-
Filesize
990KB
MD54da0708649aa8277003512c84a1b1b6b
SHA12c8239d4d1e53bde3b38049ffd8279da6f14d667
SHA256d816308b8a5bdc0a1736cadd15da386b5252b7cb7b48705e1688c438b7a263c6
SHA5121c4d7a39e286ca50cb449f3146facdff2b1a3a7bd92a527b804fb168600aab50f70df24d7a56f053c1abad045ea7a7fd775283cf7c8362e599a6a4213501689f
-
Filesize
609KB
MD547a80f62a50bcae5f08df2c5a7bba8dd
SHA1bd549a16e9ff69df9bfcc4ff8f1ef9e6d6f5f38d
SHA2560a5135a5bfa07cdcfd62037c87f735f2806fca1823390bacb9c9f94bce851c74
SHA512fa7d63c146f525630e33e0a8328afb332e35ff848d309013c8191b74f166cee6df8d71ae5c6c7799999d6ba34b6bcc5deacab53f530d72e7d8be49edf2d31b3d
-
Filesize
723KB
MD58bd4906dfddddc08bab45418220f4fb9
SHA115c7ca1789d075f183f977efdac1162cb1b8b395
SHA2561848e89f824e9c27ddf539dd4df9b1d925971e005011f97953b5220bd98fa69d
SHA5120bbce511b0016949ad26be298c5a66f4410ddf37ec5111aacd133fe7aa78d94859e6ce95001b1034dc7c5d6932327a2db8cb4c4b47240789979b2a9ab45e90ee
-
Filesize
914KB
MD5dcbbac5df4a1e877b2a8978a095becb8
SHA1390faf409a6583bfa99b2732c01e6fc3fcf24ce3
SHA25688377797909f73d508b01dab332f6e89c59da6f637e87a0581d3c9ff65f25983
SHA512b436a5feae1ca9c6e8fae3fa91eaf1a555fb0a30134a8ccdb54bf682ca7a83350910b2adc072e0c338a384b65e412d6df11a57790976b1407e02b92f3416bcbc
-
Filesize
571KB
MD51f63da5c13daee62710f38ccd36145ed
SHA1c5cebf50673bf9970df8e89945063b16a712d690
SHA25652aabb359ea75465883675b8dcb3e138a2a2ebfb6d3150fcb2b2b63f504ff3d0
SHA5128ed5943115ae0dfd77f96a65a72eff061c39faf0d77582d8b6d59f08c4920e6fcd5b6713c995a2c6ea8b41ff6e3f1d03b497077258288b603264f656d6f08e7c
-
Filesize
1.6MB
MD5a8da578ba86dcf39300bebe8c1c2d726
SHA134da3dddec7393a78fe455536592c9c6a4004b03
SHA2569e248c3639a8d7776369425280dbb26537787075c8c052a0f78bf3c0f17d5f20
SHA512787b012e0d05f38bd7ab0bdd458061b25b4eb655d01a71156dfcb131290841dee1e796ac437c6ea95816c5b2cb14009ade4e451e661896f36d167da8c105d47d
-
Filesize
838KB
MD5dd34c74294a52641409b63d7e4361fe5
SHA1b719571b3643e38b2484da315e3cc59a575a03e6
SHA2566a69939ca00247e963b59e2eec9665be4aa34ef9366741236cf207cfb0374959
SHA5126d12968b7a5bbb5907d074e0490f8aeeb058b5608f56c98f41969141a5c09be06867c1ee06819e5f65d9cae8e2ac109f6a5e19c5e4f28dc295a6fd66eadbe2c2
-
Filesize
1.1MB
MD5073636990274ab8a52e3a1ae783b7391
SHA19b638f68f6e14dff257741c91fbb8f4580ea724b
SHA256f3f55d18ed65861c0ec1567bdaaf2232c4b073db434d62087b4db9520bde0782
SHA512e029bb8052d2041158ec74d658c70b7439473eb31f2acd83eee7eb05da775375bc1e4ea103e6fc4bf0c0a4d9b746ec207320ff53900001e2a157bb06f2815822
-
Filesize
647KB
MD5eee2945c2c25505a03efadac5eed6f25
SHA1e30a4977e3ba2b023f51f50f19cb6ee5b57f0924
SHA256d0574f6706019d17f8e66c328ef7ff4db0bd0e8b1753745a51cf157a26728f05
SHA51222eb03cd7e4eab83b5b768253efa4be3a8bb0c8621d9a6b7b8bd888382ca7955bc06375f901f81e1ec50e87e3bcaff68b797210d02079b5cda2e45b0294117c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize824B
MD5c5463e3a5b4a41280f3e242ce78fa7ae
SHA14f5791805e2cab511f26ca318421fc031866bf58
SHA256a9edeff5667c2c948520fb1563d6d38cc4602813613616ba94e9e2b6b51fec32
SHA512e7c7c197dc1324d348406cf23fa203ee5ca1bcb772c294b04609f1999c439803cdd7b93587d8cacbbed540388867d233399ce3b97db224869fbf20484b45a50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize471B
MD5d0be8c23e52d466e6cc64053f7b97d33
SHA1b4a089e0dca148ba8199f6ed3cf7d8f688de6609
SHA256124fe798c212892909759ac64bcaa13c12d45d01dcc6d29a283c06bb8ab2ee9d
SHA5125324768c84068e0eeab8a2bfcccc2e7d478b40b5c8d6eddc66f7f7ed84bc0164ced23e70f1aba7a7bead91a6aa22eb9b2ee338fd43963dc6f1f2572a99721682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize760B
MD5c28d0a319f977f085b7cbabaf451ef01
SHA124a256612051f50d23918b307393e051c05285f8
SHA256e53cbd99d38ae3c3dfab046ce521535cdd074dc79ff963cbb03f067dc2b68534
SHA512c0aa2695ad4c76de156a459da38db936b4dce871ba8c5c4f5b01cdd90070551b34cf9e64af3ff278e69017859de7ec2aad0abdc695c61554b3cabaed38dea431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize412B
MD548763532a9d3faf12e5163601ea3316c
SHA10c457e25409e96d6df6756b69f898c9c25231fdd
SHA256259c831d78b6658aeefcf71ef1031b192f39da16d55a63feee95e584a109c980
SHA512584e99265b10d827b6f40cee21b8a9e47aeceb47b980efec314fca2e2b38c6284da5304c7da0f976420fb457fc43fa2b2d36c411fda8ff77e97da10fdd1dfdbb
-
Filesize
472KB
MD58d0d83bed77e22d162c08f565a54161f
SHA120362f8cd9eae4eeaf00af5ce0596b784f463eb8
SHA2562551d732b867f6a309236803753bca4600e6bdffc98da6cbd818b1592369bff4
SHA5120eebf6e181b7a7b66dd6bf5121c4020eab455a86e9f46aae78b43b1d6d3e99448c856a1ec590b0c6394c22ba4997456392f563493de45634c88d2f8ba431af1e
-
Filesize
413KB
MD52350b47261040b1ee32f7df427ab30fc
SHA1e656cced405e01b6a60b7444b2c9e1b31ed7c63a
SHA256612881f476b4820221970c20f44ee5d9cd9c64a2cd3c9ec82e6757209c0184db
SHA512a9e5838e63c2f786d57fd3e808ed54c6af0f7fc60dcc9cc1d606309d976c1b8954ef6271838db3e20325a6d66889362e3f28825a6fdba5075b860efc43d1d941
-
Filesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{03BA58C4-B905-4D30-88C9-B63C603DA134}.3.ver0x0000000000000001.db.MEDUSA
Filesize414KB
MD5b6a55a4c330b5131d7650a2ac5577498
SHA163777aa7830d51cc2ec2d24df1e3284d1a6ee60c
SHA2564861f6c1a03b978296c8018d69c59818d3b49a087b8ed2f793d2a4fab8f2844a
SHA5125380a665aa4d88bb490fb7725edabd309f37ffab874985ec7db1c8eb832a10d13be2a129a513261f456d43ed5dd2df8eac20720bf806e9f0f305ed36f3689973
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000019.db.MEDUSA
Filesize94KB
MD5d75605c9a4c69a99f8bd47998a85b0f4
SHA1d77f2a68a7d62e5b3ec316566b8a5bc10c9819bd
SHA2560b18a214d7a6bab01f5b11e3c9139c880afdac58692de837c742c6554f338c10
SHA512f43c55e63ae5cc540b91fef48b37021660e6dc95f04f134db47a2191edbe4c2c008ffa06b4ecd7e263bb06c96afd355da368c5bc0b84115330bb62b78da9b35c
-
Filesize
28KB
MD5c04f4cd42b871284dd4b06f3f2dd0a16
SHA1adf63e4d47034103c3d62bedde019f6b736cc489
SHA25695745eea1c8e4d276b2dd1e36895f738c8e40aff9f1904c6443faccf3c4a19df
SHA512314b799d3f32c0cde6169abcae18f8e56b3d8c8f55edd4ab5df0cfc2dcc0f0080b834791612d42b188f0910a9f88f96e3fff14ee25b8e492cd67664426af500a
-
Filesize
1KB
MD556ab74d05358ad91ab36f987aa13146a
SHA1f9c35cc63e7c15941305790cff785bf0b8ad4c9d
SHA256c950e30c93b1d263b38d8cc46767277b3a4970bc1b923d5b97db7dadab24e76b
SHA512bb4794fb5a332a23b4ff9bc6abaf82e581e2f11e51f5e5a52f1c530cc417cab3c184340314e0e2ea7f57203040ba38ec36584d68cd6914f6c7830d0ced14aa41
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\HQDQ62NL\microsoft.windows[1].xml
Filesize97B
MD5f3eb6d7a4aea803e7443dcf79a05a16a
SHA17e623e6c9a71bce09b29f26cad94d312405029d9
SHA256d3ac083baee707db5d0e08c6debd321a5bc4393c4317ce97189fc9251c00f5b4
SHA51299ff78923fc6aea399e46643983881d6892e03bf85072fdeb2c366fb04a12f1c29d53d0818e308c14bca798be553a04fc10760053928c3c3a3bbbdeaca1cc36b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\95d9a2a97a42f02325559b453ba7f8fe839baa18.tbres
Filesize2KB
MD5d7b29a9011d96d6d946131d284d64d30
SHA130e485681faed05f6e6313209aeeaa85427e75b4
SHA2564f5ea8323fcc22a475bac0d3e87ed1371abd0066c52cbd21fe4de0a98120e59b
SHA5123cde29a4df83b3741f83226f71bb88a2696d09daab01f529aa58608710636f8016786aa411838ac68403ed7ec5f745be2e70f583ca8b7eab0a3b5d275e1cd262
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
Filesize2KB
MD525966452b1ea0258c6ddc86d8053f7a0
SHA1de7bd8e7d22c8f647bcf5c59284b7ac403d9f323
SHA256307973841dee72e48513cf9afc8268ce86b15bd1b9a8bfff995ff3a9690752aa
SHA5127efbab057eac2ef12f02fb546c01835ceb831def54c1c7a7540579d2bd2467db37fe3c59d98ded78e1d5a986fd64a22b1c413ba3c0668a47b169231c2354d409
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{8ABD94FB-E7D6-84A6-A997-C918EDDE0AE5}
Filesize36KB
MD5bad093419be1135cfe9694ea77088c78
SHA176204c7ca72cf666add9c9931389d635c82e8af0
SHA256136808af50ee73df9befd76f7aca21765782565b0095227c5a287f3be0b5ef3c
SHA5123b5cb7f80d7cbc557b5a32a995cd607257ac8e56af935ce6f64c54ba1f311a65ef00c69c69047b6eb7bb678c2b1bc0a3c37548aef417ea49e414e1a34bcf651d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133862455885059680.txt
Filesize70KB
MD50db06e17e46939f306646bc25bca6578
SHA1406436a75c9abbbe87fa8f9ab555a9a932daffa6
SHA256cfd597bc27bae4da2a203515970f13be0669c8b98b703558fa092b8342e2b49f
SHA5120c074e5ff583583ab77d727d876c475eab37bbbdd11fe4a15023ce1055931a1f3dff34e4456d48bb9fae8e854b27392445cce6407594f3569d7ee9d1239e9ee8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize279KB
MD5aafbf35f3631eb4e41d5cacb2c28e338
SHA175449993fcd05878755a8afcfc88aa08e10f5213
SHA2562cf3a1d2c92ac4fee6fdd9a1fa9a25a2704b7607d79e0bbfcce6948e853bcdf7
SHA512c670ee483adc687c7fffb09d422c11aeba775ef0be470dcdc48751d168b8aa445aa894a13c0ac38c89164c60eaced98c2653d8b7ecadd85050a03d0e84f078e1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize278KB
MD56a7b7da5ab679dc68c25123930fca1aa
SHA10463faaac310d5c1cd1daed3f1d6d2dbca250484
SHA25626db691d4f23978e14aca4d08c2518cab2756ac15ccbb5369a26517fc273ef55
SHA512e8bec70fef89f71681834c15274dc88894d89367a784c87e886ffa6c3061c2eab414b2ce52a09700f4d453e1c5055449e05b35dfe985221f4f2452cd9d8ea2bc
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize273KB
MD57053460e6606dae15a4c807b85b7784f
SHA12dc56f32869e14a19a7106ca3bc2bb5ee26f3a92
SHA2562c686502e62aba1e8176b2039b2650b7f4bb420c3081832fa995e1f680d57288
SHA512a45aa51de0e9b9e8af2278f79cd156520b95fb830d4b1443d47eec0bd6bfea2fb3c135959ccb3a7be3a755734f372b9ce9ccac11b9602ae7861820721da4d83a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize269KB
MD5b6196969061d6c019270da9667a6262c
SHA1ab19508cef3327b4680e4d1572c720ee135d2380
SHA256a26a967bde12b2b3ee0a29ff48c7a3f6ad98f701846a28b2db555f971cbb1a02
SHA512e158b03e9cca4be946c4a117bd9351d5a3b7f15e9b705f90194dee546e2c5a6eb8e01023623fae3add152957b6b5535a1e53a9c40039d307785727f003fc8927
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize271KB
MD550c1e4e1484c0261f87070de7cd4de4e
SHA175d9bd11fb08e3191e88ff0dd8141947d1a819a4
SHA256a01b205298048c71eafc071b2f5baf66ea4cadd10dc3c075a25152ecb1ccedc7
SHA512e5a74c666439cc5899edb47be029447bfc60d3c3098f84ba183634b9d5e006369b87244e2934fa4c25f273f70634f02538b0aa8d11e31c87246b1ccc30454306
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize261KB
MD5ba72a2ed6239a63aaa71d0886f83e941
SHA132bff024336d196910160a626c21623a6cf163e2
SHA2565d42dcc238a86b1903d7053fea69535bc1fb409fcd04a5d8112a35f620363479
SHA5127fa93f18d6e69969846ed4a82af570dbfcb5024bd654e6b4b38c3dd61f2059dd43ce360a8f20b75c94cc1bc5ce686e9c544ca49ebb078c3212b11219933fe4cb
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize270KB
MD562f2d113a20e2df98eab36657fca42f5
SHA15e7693dcc84fda36f24fceec864ad895fd068bff
SHA25619ca3e5f2ac7ba45fec0d779d96fbca4f22ff90418925b27d5d43c33c9a607fb
SHA512ef697b90c0e7bb0b3a71d75e369237c36a3abee8c5a8c857ebedfda49bfd01358aaacd36f1ab0bcf182a38411aff45707497298628d2a9568a69a40422ed7dee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize265KB
MD5822b1dbad2864cf4a4f687627981af2d
SHA1200ec008dc4bd8538a6ef30800aafbd1a97b369f
SHA256ad82e672eb96af498eeddb8ba5451847655a68b9a37b2ddd02d28c3d32f73e21
SHA512c28b4b0fc469f283327fd4257c9b2e4d1ba4b297e72d62e2b82c31553874011e1c81ce7c0907a1f1cf6570936f96c25121d6531665a915b3a9f19e20958f0026
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize262KB
MD5951c104d1e1f23f4ee0e44c03ab1ae0e
SHA145f2f771c6ff19fce09ccc1789687ca74f159a6f
SHA2563bc53209c109e8c3db2d50cb6228a4ee4a785d0c64351f01495247e8be5e0a00
SHA51200df1d20084b31fc4041e7a0f2e76c688cd191cb2799579a1bb261f777f4cadf56392fb0baaa3bbe3dec79ae8f6fe45799b70ae28738c4dead10c42156853d83
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json
Filesize272KB
MD5adddce5244caff354c6553112e66713b
SHA124360d3acc4cfebb5540cb23ae18d3f750c1da38
SHA2565cf1230a34400825464dcc8a321006c1cbec70bbd9c1b5bce8ab45d278a5586f
SHA5121912fde84967d20536054730c0649369ae4093fbdea9951d8d1144758c2fdae200615bc137eb960c1def67569bb555acdc54fe7081e55bf1d1465f652ce7ec14
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat
Filesize9KB
MD55fc240139c943b2ba31c6fcdc7b112d4
SHA19ed52f20fac271474804a01204b761579225599b
SHA2564158b78b8cf27be05fdd85c5cd4db339f6975833ee4a79053357820a21e83bf1
SHA5127f23d120361331d792d6e0844f9a56ec0589dc205547253311425e2b46b66b023b83f87bd729be5f56f78db72c9f3528eab993df8c90e5fc21a016adcdb2154e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize13KB
MD55e42136608ae960e8de17356220de2c0
SHA1f40a04dac53abfbd745c9c5e107710c0fd3c7111
SHA2562dba0c393ee20a4d9dccdedcc4cde7b0536cce6a8507489c11ff543a01c6e0ad
SHA5124bc773ce264063fa6b669a2f644290f7a7f642757dd1e58479929d9c6c87fdd82c2851f28e5432bc840342023c34d6e34403bf330bc7e95f5b8c66fb699fef8a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize13KB
MD56977ecc99d66b1275a5e2b6d624c42bb
SHA1f18b82282624fa08ca035fc2e20e645e891607f0
SHA256cfc7200b033ac80a782151ba186e84365e37924b3fe0091c0543f4b6ceada83f
SHA512efa57fb16a366bd7a19e39dfc4b0852b314abc2d901d0ea0937c89a5f129f156708cc33d6be38626617edcd4481fd0b7503e519788dbbf756c6013b378a22fa4
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\TileCache_100_0_Header.bin
Filesize10KB
MD5213db8d196307fe52744e4748166d2b0
SHA1a50321e5d9d9f5a5cae951a3d71c8a5f1d11001b
SHA2568d3f2bb28a02a6066a72228aacd2dda68d7066500f368afdd2a68c48057e18ef
SHA5128f1f5a9eeb289b71773e67da7366de5da03e586a5306e8c1ef97d41ebcf9bba9fca673934b6dd8084f4ede4acac07333e4eb1757e15a88f24b1325e4695a0fae
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04
Filesize412B
MD54aef471525c58636a85c2403de2dc2d8
SHA183920f2327d8bd5397ca492fd49afb1ee7fab5c5
SHA256ac998d290fa19afc9078689014f0b158191ba76e6d3b13e95b28e86294c66627
SHA512f8e561bc56f8430e46d21913f735a73bd24e6fb882f32bc4daf9370923be0ef9eab2dc1b306852688afe2db0d64fae8cf2c0cb233547124a2b2046f64b06ef31
-
Filesize
5KB
MD500e5fcfd833151f7cbde607e2f7afeb4
SHA155839875c0947aafebff53d22ccc5dad29fe3563
SHA256b80192aaabe007baecd0603e3ce183e9d554b8a6b0411d20716acfa086ae3035
SHA512f056777a1987c3becdc217bdc2d82e6aa41086d38fddaa45c42f1726b6f7b7616a10918081650e825a724464ef148b669bc258d38a62e0de8642e2607a0b0de7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\5f7b5f1e01b83767.automaticDestinations-ms
Filesize5KB
MD565deb9dc1a547e230170e17dcda03fcd
SHA1d6512db3fd1218f50163c6f0c5c25e6de7caa505
SHA256fd38ee06560a5054ad30f5d791c895303966718b76f167a166ff43799a3247ce
SHA51242f1e7ea479c45aa6fbb10e6f006b1ff6b1a26ce6659526bba3419429932629365daf78040c83f321237b2f18fd5fd89648ae4c9ebd951b18e63488981fd21d1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Filesize5KB
MD55641d5a2c0f6b4745420bf53e31b71b4
SHA13ca7780193180db837d6dd034283d77b41bdc30f
SHA25683bfe558d3c170a2f4f97b7468e378e74bac748352b9225299c68d2ea473b35c
SHA5123b50816569830109bcf236349dcd2d9aab1b57b1c657909a9c0bc8e8e13f48dc1047cfec631c5c3a54e0a9a27e318b290779b624bfa8a3007c99cb318d9d1063
-
Filesize
14KB
MD52257fa8cef64a74c33655bd5f74ef5e5
SHA1b9f8baf96166f99cb1983563e632e6e69984ad5c
SHA256ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3
SHA5127792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg.MEDUSA
Filesize52KB
MD5cc8503ebaa06019561aea7e0343abf4d
SHA1a5ef88aef2b62b0ad040ba04681e68ec7b1c679f
SHA25648ab561e1554277409a706fa831f19c3aa0f88b332a5c3ed7fe136794ea76f83
SHA51216c1990dc64b64616228a635af9d09eac058b4891f34c37b235b7f47a3eb23be3e4006e45ff262b9014f3f57384f7d830340a3c9ca23f7929a03c39083a65318
-
Filesize
3KB
MD5e0e94d707983d9bf370dc56cf4dcbe75
SHA135fe3b31c38054dcd06a1afa92e0ed6cf03d68b5
SHA256574ae475981c98d81394d7bc905be288ed7373267cf09abdb4a0731d378ac685
SHA5124c798c79ae1ca87ff3897e9cab69c668a5f872b40421835d7f6bfb3cc8c433c89e996fff1c6280f8f7bd146c1828f3de2d6f0e4b4b7c30bc529a83598e7a0cb2
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88